Certificate Inventory report

Each section provides an overview of the information provided, potential risks, suggestions for interpreting the data, and corrective actions that can be taken. In addition to looking at individual sections, it is important to compare information in different sections to identify potential anomalies. For example, are the correct issuers identified in the Certificate Issuers for the types of certificates in the Certificate Types section or are the correct Key Lengths used based on the Key Algorithms in use.

NOTE  This report applies to Network discovery objects only and not to Agent discovery objects.

What's important about certificate inventory?

Certificate inventory gives you an overview of critical information and statistics about the certificates in your environment so that you can detect anomalies or issues and respond in order to secure and protect your environment. Attackers are actively looking for opportunities to exploit poor certificate issuance and management practices. Consequently, it is critical to regularly review and analyze your certificate environment to ensure that security folders and best practices are being followed. This information should be correlated with information provided in the CyberArk Threat Center, which provides up-to-date information on best practices and potential vulnerabilities and emerging attacks.

Create certificate inventory reports

  1. In the Reports tree, click Add , then Certificate, then select Certificate Inventory Report.

  2. Configure the report using the Certificate Inventory Report Configuration Settings

Sample report sections

Two sample sections are displayed here. There are ten sections in this report: Certificate Types, Certificate Issuers, Certificate Templates, Extended Key Usage, Key Usage, Key Lengths, Key Algorithms, Signing Algorithms, Validity Periods, and Certificate Expiration.

Certificate inventory report configuration settings