Preparing for 90-Day TLS Certificate Expiration

By

Automation of certificate management will be key for large organizations.

Certificate life-cycle management is a continual challenge for system administrators, says Murali Palanisamy, especially in large organizations that may have hundreds or thousands of certificates to manage.

Thus, Google’s proposal to shorten the lifespan of TLS certificates to 90 days is likely to result in increased complexity and more time spent managing the process.

In this article, Palanisamy outlines five ways to prepare for the change, including:

  • Gain visibility: Having a clear view of certificates is key to managing renewals and removals.
  • Track use-by dates: Automation can help track and maintain certificate renewals by sending alerts to relevant staff in a timely manner.
  • Establish governance: Creating a stable policy across all units in the organization will standardize issuing and managing certificates and simplify auditing.

Learn more at DarkReading.

 
 

 
 

09/04/2023

Related content

  • Best Practices to Prepare for Post-Quantum Security Challenges
  • Getting a free TLS certificate from Let's Encrypt
    A free TLS certificate from Let's Encrypt means you can add encryption to your network for no cost, so you don't have any more excuses for failing to encrypt.
  • Windows security with public key infrastructures
    A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.
  • News for Admins
    In the news: Vim 9.1 Now Available; Microsoft Introduces Copilot Key to PC Keyboards; Google Announces AI Hypercomputer; Best Practices to Prepare for Post-Quantum Security Challenges; Open Networking Foundation Projects Transferred to LF; IBM Hybrid Cloud Mesh Now Generally Available; IBM Announces Quantum System Two; Red Hat to Remove Xorg from RHEL 10; European Commission Launches Large AI Grand Challenge; Linux Foundation to Form High Performance Software Foundation
  • Secure SSH connections the right way
    Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=