Public and internal TLS
Domains, load balancers, reverse proxies, mTLS, private CAs, client certificates and renewal policies.
Expected evidence: scans, chains, dates, algorithms, owners.Asset inventory
A good inventory does not only list certificates. It connects algorithms, owners, confidentiality lifetime, supplier dependencies and replacement capacity.
Domains, load balancers, reverse proxies, mTLS, private CAs, client certificates and renewal policies.
Expected evidence: scans, chains, dates, algorithms, owners.User keys, machine keys, bastions, deployment accounts, automation scripts and secret stores.
Expected evidence: key inventory, rotation, revocation, logging.Packages, container images, binaries, plugins, EV/OV certificates, HSMs, timestamping and release policies.
Expected evidence: CI/CD chain, signature formats, validity period.Contracts, health, identity, industrial secrets and archives that may be captured today and decrypted later.
Expected evidence: classification, protection lifetime, network exposure.CDN, WAF, VPN, IAM, HSM, EDR, email, backup and network equipment with cryptographic dependencies.
Expected evidence: PQC roadmaps, hybrid support, contractual clauses.OpenSSL, BoringSSL, libsodium, Java, .NET, Go, HSM modules and custom usage that freezes RSA, ECDSA or ECDH.
Expected evidence: SBOM, versions, configuration, replacement tests.