<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificate Management Tools in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84796#M5176</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1286833405"&gt;@AaronFaby&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;automate the discovery and management of certificates.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We have technical limitations (CAA records) in place to prohibit certificate issuance without prior registration. This largely reduces the need for discovery.&amp;nbsp; What remains (e.g self-signed certs) is detected by our &lt;A href="https://www.gartner.com/reviews/market/external-attack-surface-management" target="_blank"&gt;attack surface management&lt;/A&gt; tool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are now working on the next step in our maturity, by encouraging site owners to use ACME for cert issuance/renewal.&amp;nbsp; Beyond significantly reducing the maintenance responsibility, it also shifts the remaining maintenance responsibility to the webmaster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Oct 2025 01:47:16 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2025-10-17T01:47:16Z</dc:date>
    <item>
      <title>SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/38910#M2935</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that SSL/TLS certificates will have shorter lifespans, managing all of the certs that are in use by an organization is going to be even more important.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to see what everyone is using to automate the discovery and management of certificates. I am aware of Venafi, but was looking for some alternatives or perhaps some open source options.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 19:56:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/38910#M2935</guid>
      <dc:creator>AaronFaby</dc:creator>
      <dc:date>2020-09-01T19:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/38924#M2936</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I don't use this personally because we have so few but I do have a lot of&amp;nbsp;&lt;SPAN&gt;colleagues that use PRTG to monitor their TLS/SSL certs. It's a full blown network monitoring&amp;nbsp;tool that can monitor way more than just certs but they found it greatly helped with keeping track of cert expiration.&lt;/SPAN&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 13:31:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/38924#M2936</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-02T13:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84531#M5166</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The &lt;A href="https://certera.com/blog/what-is-certificate-management-why-do-businesses-need-centralized-certificate-management-solution/" target="_blank" rel="noopener"&gt;certificate management&lt;/A&gt; is the process of acquiring, deploying, monitoring, renewing, and revoking digital certificates.&amp;nbsp;Today’s businesses aren’t just running a single website anymore. You’re managing cloud applications, mobile platforms, IoT devices, internal services, third-party integrations, and every single one of them depends on digital certificates for secure communication.&amp;nbsp;As your organisation grows, the number of certificates grows too fast.&amp;nbsp;If you’re in a regulated industry (finance, healthcare, eCommerce, etc.), poor certificate management can mean non-compliance. You need to meet and follow standards such as PCI DSS, HIPAA, and ISO 27001. Hope it helps!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:25:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84531#M5166</guid>
      <dc:creator>erika_12</dc:creator>
      <dc:date>2025-10-08T11:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84620#M5169</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure why you are still referring to SSL certificates these were redundant once TLS V1.0 came into force.&amp;nbsp; What you should be doing right now putting my Post Quantum Cryptography (PQC) hat on is upgrade to TLS V1.3 immediately in preparation for PQC migration and discovery as this is becoming increasing important in 2026.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On 15 March 2026 - RSA and ECC certificates lifetime will reduce to 200 days and progressively reduce by 15 March 2029 to 47 days and domain validation of 10 days.&amp;nbsp; So, put away the spreadsheet and ITSM or CMDB manual process and commence preparing for automation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are quite a few tools and services to do available.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may have to some research yourselves and Proof of Concept with testing to see what is going to valid for yourselves.&amp;nbsp; After the Entrust was distrusted:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.digicert.com/blog/key-takeaways-from-the-entrust-incident" target="_blank"&gt;https://www.digicert.com/blog/key-takeaways-from-the-entrust-incident&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may have many unknown wild certificates, SSH certificates and external and internal certificates within your organisation.&amp;nbsp; &amp;nbsp;Certificate Lifecycle management is a three volume NIST guidance problems for everyone and as a result of manual processes could mean outages, configuration errors being caused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With 2030 now looming and the first quantum computer on the horizon, now is the time to think and discover where your existing certificates reside within your organisation and prepare - Public Key Infrastructure (PKI) as it is know will be redundant along with many authentication and authorization techniques.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So educate, and prepare now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prepare for automation rather than manual processes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 06:13:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84620#M5169</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-11T06:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84655#M5170</link>
      <description>&lt;P&gt;Decidedly low-tech, but when you manually renew a certificate put a reminder in your calendar to renew it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Expiration monitoring is not where your focus should be.&amp;nbsp; Instead, you want to&amp;nbsp;eliminate the recurring administrative overhead before it becomes even more burdensome.&amp;nbsp; Google "acme certificate renewal" to learn how most certificate authorities handle the automation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Over the past year, I have had about a 60% success rate in my company convincing the various website owners to implement Certbot or Win-Acme.&amp;nbsp; I figure I will get another 20% when they have to start doing it twice (or 4 or 8 times) a year.&amp;nbsp; The annoying bit will be the last 20% who's appliance can not handle automation.&amp;nbsp; For those, I will likely recommend they purchase a TLS-Terminating proxy to front their appliance.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 01:22:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84655#M5170</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-13T01:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84746#M5173</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;I think you have to get used to apply Crypto-Agility with the forthcoming mandates from USA, Europe and Australia plus PCI-DSS and HIPAA regulatory updates for strong cryptography to be applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are plenty of Hack Now, Decrypt Later (HNDL) attacks going on at the present.&amp;nbsp; Certificate Lifecycle Management (CLM) will be an essential skill to apply manual intervention will not be sufficient, especially with certificates expiring literally every month (47 days) and domain validation having to be conducted every 10 days.&amp;nbsp; Mistakes will be made, outages will be endured and compliance penalties will increase with frequency.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The old days of spreadsheets and manual means is fast coming to an end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Especially in Kubernetes and CI/CD environments too, where developers often get the high level certification and security elements correct, but don't know how to enforce application security where it is needed most.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other areas will be IoT, IoMT, SCADA, embedded devices and Smart Buildings and associated monitoring systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 19:58:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84746#M5173</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-15T19:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84795#M5175</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;... manual intervention will not be sufficient, especially with certificates expiring literally every month (47 days) and domain validation having to be conducted every 10 days.&amp;nbsp; ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Although this is the driver behind our ACME push, I have learned it is not yet a great motivator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I started reaching out to our site owners about 2 months before their traditional CSR renewal.&amp;nbsp; Originally, I started with&amp;nbsp;"in 2029.... 47 days" and generally got the response "we're busy now; we will deal with that later.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eventually, I learned that I got a better response by focusing on instant gratification....&amp;nbsp; Now I suggest to people that if they can get automation set up within the next month or so, we can avoid the painful manual renewal process starting this year.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 01:00:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84795#M5175</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-17T01:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84796#M5176</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1286833405"&gt;@AaronFaby&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;automate the discovery and management of certificates.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We have technical limitations (CAA records) in place to prohibit certificate issuance without prior registration. This largely reduces the need for discovery.&amp;nbsp; What remains (e.g self-signed certs) is detected by our &lt;A href="https://www.gartner.com/reviews/market/external-attack-surface-management" target="_blank"&gt;attack surface management&lt;/A&gt; tool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are now working on the next step in our maturity, by encouraging site owners to use ACME for cert issuance/renewal.&amp;nbsp; Beyond significantly reducing the maintenance responsibility, it also shifts the remaining maintenance responsibility to the webmaster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 01:47:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84796#M5176</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-17T01:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84824#M5178</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;You have many problems tackle PQC and Crypto Agility within the next four years - the clock is ticking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even this is expected to cost by heuristic about 15% of the current security budget per annum.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let alone finding embedded devices, SCADA and various other IoT left behind and forgotten.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hack Now Exploit Later is the current norm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2025 02:38:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84824#M5178</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-18T02:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84853#M5179</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;, Sorry, but I'm missing the connection you are making.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that certificates are signed with a hash-algorithm that likely will continue to evolve (from yesterday's MD5 to today's SHA-256 and eventually to tomorrows Dilithium).&amp;nbsp; What I don't understand is how PQC impacts today's desire to develop/automate a good certificate lifecycle management program, the topic of this conversation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anything, I would think a stellar&amp;nbsp;certificate lifecycle management is one of the few things that users and admins can do today to prepare for PQC as it creates a map of where encryption is used.&amp;nbsp; And, automating certificate (and system) maintenance increases the odds one can implement new hash algorithms shortly after vendors release them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for SSL vs TLS, absent a version number they are &lt;A href="https://en.wikipedia.org/wiki/Transport_Layer_Security#:~:text=changes%2C%20and%20the-,renaming,-from%20%22SSL%22%20to" target="_blank" rel="noopener"&gt;synonyms&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2025 02:14:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84853#M5179</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-19T02:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84856#M5180</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt; There are two problems: In the USA, Europe and Australia. There are mandates to change all critical infrastructure to migrate existing Public Key Infrastructure algorithms to Post Quantum Cryptography (PQC) to the 2024 released public PQC algorithms.&amp;nbsp; &amp;nbsp;This part is understood.&amp;nbsp; The majority of the world is changing to TLS V1.3 in readiness for the migration for Internet transactions, as the latest TLS V1.3 can easily accommodate the PQC migration - look at CloudFlare, AWS, Azure and Google.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;All RSA and ECC based certificates by 2030 will be redundant - there are massive strategic attacks going on at the present time, which are increasing rapidly thanks to ChapGPT Model 40 LLMs and others designed to search vulnerable systems, and attack them on sight.&amp;nbsp; &amp;nbsp;This is also driven by other state nation services, which you can understand are the likely attacks given their notoriety - without me spelling it out to you due to your background.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Second problem due to the Entrust CA problem, having issued 26,000 EV type certificates and lying about it before finally admitting the problem - were distrusted by the Certificate Authority (CA) and Browser Forum - mainly made up of Apple and Google.&lt;/DIV&gt;&lt;DIV&gt;They mandated the following:&amp;nbsp; &amp;nbsp;Reduction in the lifetime of certificate expiry to 200 days by 15 March 2026 and rapidly reducing to 47 days by 2029 on 15 March 2029.&amp;nbsp; &amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Read original blog:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days" target="_blank" rel="noopener"&gt;https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;A href="https://www.digicert.com/blog/key-takeaways-from-the-entrust-incident" target="_blank" rel="noopener"&gt;https://www.digicert.com/blog/key-takeaways-from-the-entrust-incident&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Both Crypto Agility is required by 2029 for CA/Browser Forum requirements&amp;nbsp; and PQC by 2030 means automation of certificates from external CA's is required for both regulatory compliance reasons, HIPAA, PCI DSS and ISO 27001:2022 Annexe 12 has already shifted to the stronger PQC migration.&amp;nbsp; &amp;nbsp;Yes, many will say but we don't have to shift internal certificates to automation because we have our own Internal CA's and self generate our own certificates.&amp;nbsp; &amp;nbsp;Where does the root of trust come from - in a lot of cases from an external CA, unless you have created your own SOC environment and security controls with your own HSMs etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;In Australia they have the SOCI act which applies also to all critical infrastructure which ramp up and change annually progressively forcing stronger controls and risk management techniques to be applied.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Well, first of all PKI will no longer exist once the first quantum computer breaks RSA and ECC due to Shor's&amp;nbsp;Algorithm - this is a well known fact.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So Public Key Infrastructure Key Management as we know it will be redundant, so will existing HSMs as they cannot deal with the new PQC algorithms.&lt;/DIV&gt;&lt;DIV&gt;So Hybrid HSMs are being created and certified.&lt;/DIV&gt;&lt;DIV&gt;Quantum Key Management (QKM) is the new normal.&amp;nbsp;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The other comment:&amp;nbsp; A lot of organisations still use the "spreadsheet", but others have migrated to ITSMs, or CMDB's. They have their own problems - manual practices, and inherent human error and configuration issues.&lt;/DIV&gt;&lt;DIV&gt;They cannot request certificates and neither can they implement certificates externally or internally or even wild cards or even apply to Kubernetes or other such technologies including SSH.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The only way to deal with the 47 day certificate expiration period is automation.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Remember those current PKI methods are used not only for confidentiality, integrity, non-repudiation and authentication purposes too - so all of this has to change.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So - you have two major problems the Certificate Authority / Browser Forum mandates and then on top of that PQC.&lt;/DIV&gt;&lt;DIV&gt;As I stated it will take 3-4 years for the majority of large organisations to discover, undertake risk management, progress to test and migrate to Crypto-Agility mode - due to performance hits on the use of various PQC algorithms and capabilities - back to dialogue with the vendors to change their equipment etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The Australian Government is offering incentives other nations are still asleep at the wheel - time is ticking by.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;As I stated 2026 will be a big year in AI, data security, Quantum Computing and hybrid classical computers working in conjunction&amp;nbsp;with Quantum Computing, it is already happening.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Ignore at their own peril, prepare, discover, test and transform, including education of organisations.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The connecting piece you are not getting is "Crypto-Agility" affects both PQC and Certificate Lifetime Management.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Caute_Cautim&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 19 Oct 2025 05:38:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84856#M5180</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-19T05:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84873#M5181</link>
      <description>&lt;P&gt;I do understand that PQC puts current encryption/hash algorithms and risk and that we need to prepare for refreshes in systems using them.&amp;nbsp; But that is a topic for another discussion as it is not the question the OP was posing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The part I am struggling to understand is with respect to SSL/TLS certificate management tools (the topic of this conversation), what do you recommend people do today?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 01:13:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84873#M5181</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-20T01:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84879#M5182</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1286833405"&gt;@AaronFaby&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that SSL/TLS certificates will have shorter lifespans, managing all of the certs that are in use by an organization is going to be even more important.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Just to throw out a contrarian view, does anyone else think the 47-day window is a bit overkill? To some extent, we're doing the same thing with web serving that we did with email (DKIM, SPF, DMARC, etc.) over the years - continually complicating the process in the name of "security," but in the end, we create availability issues, encouraging these critical services to be hosted/reliant on a handful of providers (because there are too many hoops to jump through). Should one of those providers experience an issue (hey, AWS?), the Internet grinds to a halt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm happy to be educated/corrected on this, but off the top of my head, it is hard for me to think of an actual incident involving certificates that was about the weakness of the cryptography. More what comes to mind is that things like private keys were not stored securely. To analogize, this would be like requiring people to change the locks on their houses every two months because some people tend to misplace/lose their keys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the original question, however, I think ultimately this tips the scale to handing your web serving and other certificate-based resources over to a third party. This will increase cost and point of failure while also increasing the disconnect between businesses and the resources they depend. And to adjust my tinfoil hat slightly, I don't see this as a security objective, but more a marketing one. The harder we make it for people to run their own services, the more it boosts a handful of providers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 11:53:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84879#M5182</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2025-10-20T11:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84893#M5183</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;wrote:&lt;P class=""&gt;&lt;SPAN&gt;...does anyone else think the 47-day window is a bit overkill? ...&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;My initial reaction was similar, particularly given that my colleagues and I sign hundreds of certs per year for our webmasters.&amp;nbsp; Our collective cry was that a 12x increase in effort was not sustainable and that they should have just done a single reduction, to 6 months.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I have come to realize is that this really is that there is a long-term trend here and they really are just revealing three of their cards at once, instead of playing them one at a time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;lt;=&amp;nbsp; 2015&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5 year max&lt;/LI&gt;&lt;LI&gt;2015 - 2018&amp;nbsp; 3 year max&lt;/LI&gt;&lt;LI&gt;2018 - 2020&amp;nbsp; 2 year max&lt;/LI&gt;&lt;LI&gt;2020 - 2026&amp;nbsp; 1 year max&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;2026 - 2027&amp;nbsp; 6 month max&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;2027 - 2029&amp;nbsp; 3 month max&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;2029 +&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1 month max&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The irony to this entire thing is that we were happily giving Entrust lots of money every year until Entrust pissed in the pot.&amp;nbsp; And, it was their pissing that resulted in 47 days and kickstarted my company's ACME/Let's Encrypt adventure that already has reduced our future annual PKI spend by more than half.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure, there are security-geek benefits, such as reducing one's dependency on CRLs and shortening time-to-production for new encryption/hash algorithms, but nothing sells quite as easily as a permanent reduction in ongoing spend.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 02:04:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84893#M5183</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-21T02:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84896#M5184</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1286833405"&gt;@AaronFaby&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hear your pain, and I fully understand it.&amp;nbsp; I am going through the same pain where I am located, except most of New Zealand is asleep and a lot of security people have migrated to Australia where they can have a better life - if they like Sun, Sea, Snakes, Crocodiles, Stinging Wasps and poisonous spiders they have it all - gone through all that previously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many areas which are misunderstood such as Developers not understanding how to use PKI root structures for protecting Kubernetes containers etc due to the complexity when really they just want the job done especially when they are attempting to get CI/CD pipelines up and running etc.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am coming across organisations who use ITSM's such as ServiceNow, or Spreadsheets, or CMDBs, but the entire processes are manual - mistakes occur, misconfiguration s occur, and often the expiration date is left to one or two people who actually understand certificates.&amp;nbsp; Whether they are used within SSH server farms or proxies, firewalls or IoT devices etc etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree that many will think about moving to cloud providers, but are they any better than organisations, looks at Microsoft outages, or AWS massive outages and we become totally dependent upon them all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All of which have their weaknesses, either the certificate database is a flat file, and you need authorisations. scripts to make certificate requests and then you need scripts and APIs and additional integrations with Hashicorp Vault or Jenkins or even Kong for applications.&amp;nbsp; It comes in all shapes and measures.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many providers out there who can provide integrations. semi-automate the certificate lifecycle management process, which historically we have left to the few and to those who actually understand it.&amp;nbsp; Who swallowed the NIST three volume bible on certificate management etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current HSMs will be redundant in the next four years, they are costly bricks but essential in many cases, whether built into an IoMT device or ICS device etc - which points back to the vendors and their capabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many providers, I have done some research on a number, but at the end of the day it is down to the organisation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) On Premises, do it yourself; 2) Build it yourself' 3) Manage it yourself; 4) Use a SaaS service and manage it yourself; 5) SaaS service and get them to manage it for you etc.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a lot more to this:&amp;nbsp; Risk Management; Assessment of current environment, Design for automation; Proof of Concept; design workflows for automation, test and test and keep testing - start small and grow in confidence, get the bugs out of the system.&amp;nbsp; I suggest using an ITSM or CMDB integrate it, but ensure you have full visibility, able to handle incidents, notifications, and audit trails and reports are really important.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of these systems are based on the number of certificates to handle - the greater the number, the less the cost annually.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is only the start of a journey, then think about Crypto-Agility with PQC, migration from Public Key Infrastructure and Hybrid systems towards Quantum Key Management - sorry folks it is happening like it or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Blockchain security is busted, not because of the cryptographic algorithms,. but the entire processes around including who can you trust.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Humans are inherently insecure, we make mistakes, the impacts are becoming bigger.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you reach out I am happy to share some of my findings; but not on a public basis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A lot of development, experience needs to be built up and humans only really learn through pain, rather than someone putting it on a plate for them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Compliance and regulations are progressing and chasing us all hard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 04:26:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84896#M5184</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-21T04:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Management Tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84914#M5185</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;Good luck with your Lets Encrypt journey.&amp;nbsp; I looked them up last night, and saw that they have done some creative work towards automation, via various scripts and approaches.&amp;nbsp; Including some Github ideas for Azure including:&amp;nbsp; &lt;A href="https://github.com/AddEleven/lets-encrypti-azure-automation" target="_blank"&gt;https://github.com/AddEleven/lets-encrypti-azure-automation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Including some links on Linkedin.com as well too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a some fascinating work going on towards overcoming our current challenges - but as usual test, trust but verify at all times.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 20:05:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SSL-Certificate-Management-Tools/m-p/84914#M5185</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-10-21T20:05:49Z</dc:date>
    </item>
  </channel>
</rss>

