dont-delay-5-steps-to-prepare-for-90-day-tls-certificates
dont-delay-5-steps-to-prepare-for-90-day-tls-certificates
5 Immediate Actions to Brace for the Shift to Shorter Certificate Lifespans 3. Configure global policies and workflows
The ever-shortening trajectory of certificate lifespans drives home the need to 4. Integrate with DevOps tools
automate certificate lifecycles for survival. So, why wait? Embrace automated
workflows today and be ready before certificate lifespans shrink to 90 days or lower. 5. Set up real-time monitoring and reporting
1. Implement Continuous
Discovery and Inventory
Understanding your certificate landscape is paramount. A complete
3X machine identities by 2025
inventory, including who owns each certificate, where it is installed
and when it expires, is required. Given the daily or even hourly
changes with short-lived certificates, manual tracking can’t keep up.
ACTION SOURCE: Venafi CIO Study: Automation Vital to Address Shorter Lifespans and Massive Growth of TLS/SSL Certificates
Renewal Processes
After pinpointing the locations and owners of your TLS/SSL
certificates, you could set up a series of alerts for expiring 83%
certificates. However, as certificate lifespans shorten, relying on
manual renewal becomes impractical and risky, and you’re forced to
spend days and weeks manually following up with certificate owners.
Organizations experienced security incidents
involving compromised TLS/SSL certificates
ACTION
When you automate renewals, you’re not just saving time—you’re
57%
making sure your certificates stay up to date, avoiding downtime
caused by expired ones. But automation is not one-size-fits-all. You
need a certificate lifecycle management solution that allows you to
automate with ACME, APIs, SDKs, agents and more.
64%
ACTION
Start by setting up centralized policies and workflows that enforce
compliance for the new, shorter certificate lifespans. This way, it’s
easier for certificate owners to request and manage certificates. Also,
don’t forget to set the right validity periods for new certificates and to
make sure the renewal process matches up with the shorter lifespans.
4. Integrate with
DevOps Tools CI/CD PIPELINE INTEGRATION REMAINS DIFFICULT
ACTION
Make life simpler for your developers by integrating the
certificate lifecycle management solution with their existing
tools. Turnkey, API-driven integrations enable automated
SOURCE: The Impact of Machine Identities on the State of Cloud Native Security in 2023
provisioning of certificates in continuous deployment
environments, ensuring strict adherence to the validity periods
for certificates used in both new and existing applications.
5. Set Up Real-Time
Monitoring and Reporting
Navigating 90-day certificate lifespans requires you to
juggle a continuous flow of short-lived certificates. So,
it’s vital you can immediately detect anomalies or when
certificate use deviates from expected behavior.
ACTION
By setting up continuous monitoring and reporting, you
can ensure all certificates comply with the new, shortened
lifespans and organizational policies. Regular, real-time
audits help identify and rectify deviations, reducing the risk of
security breaches or non-compliance penalties. This proactive
approach ensures your certificate landscape stays secure,
compliant and aligned with best practices.
A Trusted Certificate
Management Partner
Southwest Airlines has partnered with Venafi, a CyberArk company,
for nearly a decade.
About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides themost comprehensive
security offering for any identity – human ormachine– across business applications, distributed workforces, hybrid cloud workloads and throughout the
DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learnmore about CyberArk, visit https://www.
cyberark.com, read the CyberArk blogs or follow on X (Formerly Twitter) via @CyberArk, LinkedIn or Facebook.
© Copyright 2024 CyberArk Software. All rights reserved. No portion of this publication may be reproduced in any form or by any means without the express written consent of CyberArk Software. CyberArk®, the CyberArk
logo and other trade or service names appearing above are registered trademarks (or trademarks) of CyberArk Software in the U.S. and other jurisdictions. Any other trade and service names are the property of their respective