Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Newest First  |  Oldest First  |  Threaded View
MS8699
50%
50%
MS8699,
User Rank: Apprentice
2/27/2012 | 7:38:30 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
The survey of 174 IT and IT security pros had several red flags about digital certificate management.
YRAV000
50%
50%
YRAV000,
User Rank: Apprentice
2/24/2012 | 5:47:54 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
IT managers using post-it notes and spreadsheets to manage millions of security instruments.
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/24/2012 | 5:09:02 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Ya it's true ,its so difficult to keep track of it and the content here was good stuff
JonathonT
50%
50%
JonathonT,
User Rank: Apprentice
2/24/2012 | 3:31:58 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
I generally keep track of encryption keys with a key manager like GNU Privacy Assistant, passwords and other important phrases and small details with a password manager like PasswordSafe or Seahorse. As far as keeping track of SSL certificates and when they expired, most organizations I worked with would let the expiration pass by, and then they would have to scramble to get a new key. On the other hand, some of the bigger, Fortune 100-type companies that I worked with would keep track of the dates, and would be able to send out notifications and replacement keys as much as a month in advance. Kudos to those companies. What's the best scheduled solution for watching for expiration dates and sending automated reminders? Exchange? Sharepoint? A long-dormant cron job? Calendar reminders? I'd like to hear from workers at companies that track these reminders, and find out how they do it, and if there is anything they'd do differently to do it even better. I'd also like to hear from anyone else on their ideas for best-practice solutions and standardized software for the job.

--- Jonathon

cloudfilesecurity.biz
BDouglas
50%
50%
BDouglas,
User Rank: Apprentice
2/23/2012 | 10:54:05 PM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Organizations need to quickly come to terms with how crucial encryption keys are to safeguarding the entire enterprise.
It's pure madness that large Fortune 500 companies are still using home-grown, manual processes to inventory and monitor encryption assets.-
Not only are all the recent security hacks a warning to the wise, but just the operational and compliance benefits alone are worth looking into an automated solution like this.
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/23/2012 | 10:36:09 PM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Very difficult to keep track of certs without some sort of tool...
Brian Prince, InformationWeek/Dark Reading Comment Moderator


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: What Virtual Reality phishing attacks will look like in 2030.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21652
PUBLISHED: 2021-05-11
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2021-21653
PUBLISHED: 2021-05-11
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2021-21654
PUBLISHED: 2021-05-11
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.
CVE-2021-21655
PUBLISHED: 2021-05-11
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
CVE-2021-21656
PUBLISHED: 2021-05-11
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.