Level 1: Managing at High Risk with Manual Processes
At Level 1, you're likely aware of the increasing volume and sprawl of certificates across your organization, yet you're still tackling the problem with highly manual processes.
Level 2: Limiting Risk through CA Provided ToolsAt level 2, your team should look to introduce more oversight into certificate issuance and usage. For example, you may introduce tools provided by your SSL/TLS vendor. These tools offer better reporting on certificates issued from their infrastructure.
Level 3: Full Oversight with a Single Pane of Glass
Risk lies in not knowing where certificates are being used: you can’t manage the unknown. Prior to Level 3, there was sporadic oversight of the certificate landscape across fragmented disparate tools and data sources.
Now that’s all changed.
Level 4: Enabling Self-service and Automation
At Level 4, automation now starts to take center stage as you move from certificate management into certificate lifecycle automation. This starts with providing users a self-service portal or API to easily request certificates. Then you can automate the lifecycle of those certificates – from provisioning them to end devices to renewing them automatically before expiration.
Level 5: Zero-Touch Automation, Achieving Crypto-Agility
If you have reached Level 5, you’ve moved into a premier status for certificate lifecycle automation. It still may be unrealistic to expect that every certificate lifecycle is automated; however, you know about every certificate, have a process in place to manage them, and have automated the things that save the most time and reduce the most risk.
Download Full eBook
Let’s dive in - download the full eBook:
Get expanded insights into the five levels of management maturity, and how achieve a Dynamic state of certificate lifecycle automation.