Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring across NIST, PCI, and MITRE ATT&CK frameworks

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet. 

At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably authenticated. As a result, monitoring TLS certificates plays a crucial role in uptime, maintaining trust and preventing fraud. 

But for organizations aligning to popular cybersecurity frameworks by choice through NIST or MITRE ATT&CK or industry requirements like PCI DSS for payment services or HIPAA for healthcare information, certificate monitoring is no longer optional. 

Certificates can be the bane of our existence because they expire and can be misconfigured, but don’t let that overshadow the key role they play in compliance.

This blog explores the requirements of these frameworks for effective certificate monitoring and offers guidance to help security experts enhance their compliance efforts.

Understanding certificate monitoring

Certificate monitoring involves observing a certificate in stages of the lifecycle. This includes at issuance, following deployment, and ahead of revocation or expiration. It is important to note that certificate monitoring is different from certificate lifecyle management.

Without diligent monitoring, expired or compromised certificates can lead to significant security vulnerabilities. As renewal cycles for certificates accelerate and the threat of post-quantum cryptography looms, the need for comprehensive certificate monitoring increases.

🤔Confused about certificate monitoring? Check out our webinar.

Certificate monitoring requirements by framework

NIST (National Institute of Standards and Technology)

NIST’s guidelines on certificate management are encapsulated in several publications, with NIST SP 800-57 Part 1 providing specific recommendations for key management, including the lifecycle of digital certificates. NIST emphasizes the importance of regular audits, secure certificate storage, and timely renewal and revocation.

More recently, NIST Special Publication 1800-16 was dedicated to “Securing Web Transactions: TLS Server Certificate Management.” In this publication, organizations are advised on the risks and organizational challenges related to TLS certificates. Further, NIST provides guidance to ensure that certificates are a security asset instead of a liability including establishing a formal TLS certificate management program with executive leadership, guidance, and support. 

MITRE ATT&CK

Although MITRE ATT&CK does not directly set compliance requirements, it provides a comprehensive matrix of tactics and techniques used by adversaries, including those related to certificate misuse. This framework highlights two specific exploits used by bad actors: 

  • Stealing or Forging Authentication Certificates (Technique T1649). Certificate-related misconfigurations create opportunities for Privilege Escalation, allowing users to impersonate privileged accounts or permissions via the identities associated with a certificate.
  • Certificate Registration (T1588.004). Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet.

Security teams can use MITRE’s framework to anticipate and defend against attacks that exploit certificate vulnerabilities, such as man-in-the-middle (MITM) attacks or the use of fraudulent certificates.

PCI DSS (Payment Card Industry Data Security Standard)

PCI DSS requirements 6.6 mandate the use of SSL/TLS certificates issued by a trusted Certificate Authority (CA). This standard requires that certificates be properly configured and managed to protect cardholder data during transmission. Compliance includes regular scans to detect and rectify unauthorized changes to the configurations and secure certificate renewal processes.

As the world looks towards PCI DSS 4.0, more stringent requirements are being put forth. The new requirement in 4.2.1.1 requires: 

  • An inventory of the entity’s trusted keys and certificates used to protect PAN during transmission is maintained.
  • All keys and certificates used to protect PAN during transmission are identified and confirmed as trusted.

This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.

Best practices for certificate monitoring

Implementing best practices in certificate monitoring involves a proactive approach. Teams today should be asking themselves three key questions to assess readiness: 

  1. Do I have a complete and current inventory of all of my TLS certificates? This should include new certificates, expired certificates and revoked certificates. If the inventory is constantly changing (which is especially true for teams using multiple CAs), how do you plan to keep this inventory up to date. Doing so requires removing most of the noise so that you can focus on interesting cases. 
  2. Do I have complete issuance history? Issuance history is needed to make sure that ownership is clear. 
  3. Are my certificates configured correctly? Certificates are chained together to establish trust. And connect a leaf certificate to the root certificate. All the individual certificates can be valid but if the chain is misconfigured, trust isn’t established. 

Where do I go from here?

By adhering to the guidelines set forth by NIST, PCI DSS, and utilizing the tactics and techniques outlined in MITRE ATT&CK, organizations can protect themselves against a range of security threats.

We are obviously biased but Red Sift Certificates provides the most comprehensive view of an organization’s certificate estate to make sure compliance requirements are met. If you are interested in learning more about how Red Sift Certificates can help your team discover and monitor all of your certificates, you can request a demo here.

PUBLISHED BY

Rebecca Warren

30 Apr. 2024

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more