Version 1.0 | Effective Date: [DD/MM/YYYY]
Description
This explains what types of digital certificates the policy covers and why we align with specific security standards. Compliance helps prevent data breaches and meets legal requirements.
Applies to all X.509 certificates including:
- TLS/SSL server/client certificates
- Code signing certificates
- S/MIME email certificates
- IoT device authentication certificates
Description
These algorithm choices balance security with performance. Larger key sizes protect against brute-force attacks while modern algorithms improve efficiency.
Asymmetric Algorithms:
- RSA ≥ 3072 bits
- ECDSA ≥ secp384r1
- EdDSA (Ed448)
Hash Algorithms:
- SHA-384 minimum
- SHA3-512 for high-security systems
Description
Strict controls prevent fake certificates. Hardware security modules (HSMs) ensure keys can't be copied, while domain validation confirms legitimate ownership.
Description
Automatic renewal prevents service outages from expired certificates. Immediate revocation stops compromised certificates being misused.
Renewal Threshold:
30 days before expiration
Revocation Conditions:
- Private key compromise
- Algorithm deprecation
- Organisational name changes
Description
Complete visibility prevents "lost" certificates that could expire unnoticed or be used by attackers. Automated discovery catches unauthorised certificates.
Maintain central registry with:
- Certificate fingerprint (SHA-256)
- Issuing CA
- Associated asset
- Expiration date
- Automated discovery scans weekly
Description
Physical security of root keys prevents catastrophic breaches. Clear documentation ensures consistent operations.
Description
Certificate pinning prevents man-in-the-middle attacks by only trusting specific certificates. Active monitoring detects suspicious activity.
Description
Regular updates ensure we adapt to new threats and technological changes in cryptography.
This document shall be reviewed annually or following significant cryptographic standard updates.
Certificate Management Policy in Word format. Use as a base and modify for your organisation.
I don't capture anything or share, sell, or anything else to third parties.