Podcast
Root Causes 143: The Four Pillars of Certificate Automation


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 21, 2021
In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pillars entail and why they're important. They also discuss the umbrella capability of visibility, which affects all four pillars.
Podcast Transcript
Lightly edited for flow and brevity.
Ok. So, it’s four pillars and then there is one kind of penumbra capability that I think is very important, but it isn’t associated with any of the pillars rather it enhances and improves all of them. So, we’ll hit that at the end.
So, why don’t I list them to begin with and then we can dig into them.
So, let’s get into it. First of all is deployment. And this may seem obvious in terms of what we mean by that, but there actually is a little bit of nuance here. Deployment is being able to start from the idea of understanding that you need a certain certificate in a certain place for a certain purpose and take that as far as possible in an automated way to the certificate actually in production on the machine in question.
So, number two is discovery. So, deployment, you know, deployment is where I’m starting with a cert. I’m creating the cert. Automation is already in place and I’m gonna take it all the way through and I’m gonna get it live. But there are a number of scenarios where that full life cycle isn’t being run inside the automation environment. So, the easiest example is the first time you install automation. When we first start using this automation environment there is a bunch of certificates that are already in the world, right? So now I have two choices with those certs. I either manage them manually until they all cycle out or I somehow poke them into the automation system. Right? And so, this is where discovery comes in. Discovery is the idea that you go out and you find these certs and again, the more automated the better. You go out and you find these certs and you bring them into the system where at a minimum you can identify them and watch them and know when they are gonna expire and even better when you can take over the remainder of the life cycle for those certs and run them directly from the automation platform.
So, number three then is revocation and replacement. So, part of certs, part of the reason we have certs and not just keys, is because we want to be able to revoke them.
And then lastly of the four pillars is renewal. So, this is what you were referencing earlier, Jay, which is not only do I need to be able to revoke these certs but fundamentally part of the point of a certificate is that the key doesn’t work forever. So, the certificate expires, the whole thing stops working, it time bounds it and forces you to have a fresh cert at that point. Well, as these are happening and they are expiring out in the world, guess what? This is vulnerability. This is the time bomb we talked about before and so, automated renewal is hugely important and hugely important for me to be able to know that those renewals are coming, but also for the automation system, the machinery if you will to take care of the renewal for me rather than forcing individuals to become involved at that point because of labor, because of risk of error, the things we’ve already talked about.
So, then the last point probably to be made, and this applies to the pillars and the visibility penumbra is the broader the coverage footprint, the better. There are many kinds of certificates in the world and as you’ve alluded to, we could take this basic idea and even apply it non-certificate- based keys and all these ideas would hold up. I guess except revocation. But, the more your coverage works, the better. So, if, you know, if you are any kind of sophisticated in a present environment, you have public and private certs. You have different kinds of certs. You have client certs. You have server certs. You have email certs, etc. And, the more all of this can be handled by your automation platform, the better off you are. Right? You reduce your risk of these outages that are due to unexpected expirations. You reduce the burden. The time and labor involved in provisioning and the error involved in provisioning. You ease your response to sudden events that require certificate agility. And you know what’s going on. So, the more certificate types and the more environments and the more of your digital footprint you can get automated – and I dare say, get under a single automation platform, the better off you are.

