Table of Contents
An SSL certificate is a digital credential that authenticates a website and allows the browser and web server to communicate securely with each other. It provides an encrypted connection, protecting data from interception or tampering, including login credentials, payment information, API calls, etc., across all secure web environments.
SSL certificates are the base level of web security and, as such, are the foundation for secure logins, API calls, and financial transactions.
Cybersecurity Education and Training Begins Here
Here’s how your free trial works:
- Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure
- Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days
- Experience our technology in action!
- Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks
Fill out this form to request a meeting with our cybersecurity experts.
Thank you for your submission.
Why SSL Certificates Matter for Cybersecurity
SSL certificates are a major security control that encrypts data during transit, validates server identity, and stops impersonation attacks across digital services. For a CISO, managing certificate strategy is an ongoing risk function with direct implications for compliance, user trust, and exposure to breaches.
The security team has a unique challenge here. SSL encryption stops credential theft, session hijack, and man-in-the-middle attacks. But SSL encryption creates blind spots. Encrypted traffic must still be inspected to catch threats moving through it.
Compliance leaders have their own stake in this. Encryption of data in transit is a requirement or a strong recommendation under PCI DSS, HIPAA, GDPR, and SOC 2. Valid certificates, correct configuration, and proper chain of trust all fall within the audit scope.
Certificates also create operational concerns for IT and infrastructure teams. Expired or misconfigured certificates cause browser warnings, broken authentication, and service outage. Cloud and containerized environments, along with automated certificate provisioning by DevOps teams, enable them to keep pace with deployment velocity.
How Do SSL Certificates Work?
SSL certificates provide users with assurance beyond just encrypting their data. Before any data is shared, an SSL certificate establishes trust. That trust is provided through a combination of a handshaking process, a set of public and private keys, and a hierarchical structure of trusted Certification Authorities (CAs).
TLS Handshake
A Transport Layer Security (TLS) handshake occurs before a secure data transmission session is established with your browser when you connect to a secure website. The server will present its SSL certificate. Your browser verifies if the certificate was issued by a recognized Certificate Authority (CA).
Upon verification that the SSL Certificate is valid, trusted, and not expired, both parties agree on a temporary session key to encrypt all subsequent communications. In their browser, each user can see a padlock icon and the HTTPS prefix in the browser address bar.
Public and Private Keys
SSL certificates use asymmetric cryptography, which applies two mathematically related keys that operate together. The public key is located within the SSL certificate and can be viewed by anyone. The private key resides solely on the server. Any information encrypted with the public key can only be decrypted with the corresponding private key. Regardless of how much an attacker may have intercepted during the data transmission, the attacker will not be able to view the data.
Private key security is absolutely non-negotiable. In the event of a compromised private key, all security assurances made by the SSL certificate become void. SSL inspection must anchor any detection strategy—encryption that protects legitimate traffic protects malicious payloads equally.
Certificate Authorities (CAs)
CAs, such as DigiCert, Sectigo, and Let’s Encrypt, are third-party entities that issue and digitally sign SSL certificates. Most browsers and operating systems include a pre-defined list of trusted root CAs. Certificates signed by unrecognized or compromised CAs trigger a browser warning flagging the connection as insecure.
The CA/Browser Forum creates, maintains, and enforces the standards all CAs must meet to create and maintain trust. Security Architects should understand that this chain of trust begins at the root CA, continues down to the intermediate CA, and then to the end-entity certificate, ensuring proper security and enabling diagnosis of TLS misconfigurations before they become exploitable gaps.
SSL vs. TLS: What’s the Difference?
“SSL certificate” is still the term the industry uses, but SSL itself is long gone. TLS is the protocol actually securing connections today. SSL 2.0 and 3.0 were retired due to critical vulnerabilities, and TLS 1.0 and 1.1 have since been retired. Organizations still running either protocol are exposed to well-documented attacks.
Protocol
Status
Key Risk
SSL 2.0 / 3.0
Deprecated
Widely critical vulnerabilities; no longer supported
TLS 1.0 / 1.1
Deprecated
Vulnerable to several known exploits
TLS 1.2
Widely supported
Still considered acceptable with proper configuration
TLS 1.3
Current standard
Faster handshake, default security measures are stronger
Protocol
SSL 2.0 / 3.0
Status
Deprecated
Key Risk
Widely critical vulnerabilities; no longer supported
Protocol
TLS 1.0 / 1.1
Status
Deprecated
Key Risk
Vulnerable to several known exploits
Protocol
TLS 1.2
Status
Widely supported
Key Risk
Still considered acceptable with proper configuration
Protocol
TLS 1.3
Status
Current standard
Key Risk
Faster handshake, default security measures are stronger
Security teams should audit all environments to confirm no systems still accept SSL 3.0 or TLS 1.0/1.1.
Types of SSL Certificates
SSL certificates vary in how the issuing CA identifies web property (validation level) and in how many domains a single certificate can cover (coverage scope).
Validation Level
Certificates are based upon validation level, including:
- Domain-Validated (DV) certificates are verified through an applicant’s control of a domain name. A CA does not check any organizational identification data. It’s the quickest and least expensive of the three; however, it’s often issued to phishing sites. While a DV certificate provides encryption to the user, it provides very little, if any, identity verification.
- Organization-Validated (OV) certificates have a CA confirm that the applicant has domain ownership, along with basic organizational information. OV certificates are suitable for business websites or enterprise services, as they provide a reasonable level of identity verification for such applications.
- Extended Validation (EV) certificates provide the greatest level of identity verification through the most rigorous validation process. The CA validates the applicant’s organization to ensure that it exists legally, physically, and operationally. EV certificates deliver the highest level of identity verification—critical for organizations where customer trust and compliance are under scrutiny.
Coverage Scope
There are three coverage scopes for SSL/TLS certificates, including:
- Single-domain certificates cover only one specific domain.
- Wildcard certificates cover a domain and all of its first-level sub-domains. This makes wildcard certificates easier to manage in larger organizations. However, this configuration could create a problem in which a compromised private key would expose every subdomain.
- Multi-domain (SAN) certificates can cover up to 100 domains under a single certificate. This is useful for organizations with numerous web properties.
When choosing between wildcard and single-domain certificates, security architects should consider whether the increased ease of use provided by wildcard certificates outweighs the potential increased risk.
The Threat Hiding Behind the Padlock
The “padlock” symbol on a web browser, while indicative of an HTTPS (encrypted) connection, does NOT mean that a website is secure. The difference between the two is a common misconception used by cyber-attackers.
For many years, consumers have trusted the “padlock” symbol. Cyber-attackers have exploited this. DV Certificates are free, instant, and routinely abused by threat actors. They use these certificates to create valid phishing websites that display a “padlock,” load content via HTTPS, and pass the first level of trust testing performed by most users.
The padlock once signaled safety—today, phishing sites exploit HTTPS to weaponize that assumption.
What SSL Does and Does Not Protect Against
SSL certificates do one thing well: they secure data transmitted between browser and server. But that narrow assurance is routinely mistaken for something broader.
CISOs should ensure security awareness training reflects this clearly. Users trained to equate the padlock with safety are easier to phish—not harder. That misplaced trust is exactly what today’s threat actors exploit.
SSL Protects Against
SSL Does Not Protect Against
Data interception in transit. Encryption prevents attackers from reading traffic captured between the browser and server.
Malware on the server or endpoint. Encryption has no bearing on whether a host is compromised before or after the session.
Adversary-in-the-middle attacks on the connection. Certificate validation ensures that the browser is communicating with the intended server, not an impersonator intercepting the session.
Phishing and social engineering. A valid certificate confirms an encrypted connection, not the legitimacy or intent of the site on the other end.
Credential theft over unencrypted connections. Login data submitted over HTTPS cannot be read in transit by a network-level attacker.
Compromised web applications. SSL does not protect against SQL injection, cross-site scripting, or other application-layer vulnerabilities.
Session hijacking via unencrypted traffic. HTTPS prevents session tokens from being intercepted by an attacker on the same network.
Malicious sites with valid certificates. Threat actors obtain DV certificates for phishing infrastructure in minutes. Detection must go beyond certificate validation to analyze domain age, hosting behavior, and URL.
Data integrity. TLS ensures content has not been modified or tampered with during transmission.
Post-decryption data handling. Once data reaches the server, SSL provides no protection over how it’s stored, processed, or accessed.
SSL Protects Against
Data interception in transit. Encryption prevents attackers from reading traffic captured between the browser and server.
SSL Does Not Protect Against
Malware on the server or endpoint. Encryption has no bearing on whether a host is compromised before or after the session.
SSL Protects Against
Adversary-in-the-middle attacks on the connection. Certificate validation ensures that the browser is communicating with the intended server, not an impersonator intercepting the session.
SSL Does Not Protect Against
Phishing and social engineering. A valid certificate confirms an encrypted connection, not the legitimacy or intent of the site on the other end.
SSL Protects Against
Credential theft over unencrypted connections. Login data submitted over HTTPS cannot be read in transit by a network-level attacker.
SSL Does Not Protect Against
Compromised web applications. SSL does not protect against SQL injection, cross-site scripting, or other application-layer vulnerabilities.
SSL Protects Against
Session hijacking via unencrypted traffic. HTTPS prevents session tokens from being intercepted by an attacker on the same network.
SSL Does Not Protect Against
Malicious sites with valid certificates. Threat actors obtain DV certificates for phishing infrastructure in minutes. Detection must go beyond certificate validation to analyze domain age, hosting behavior, and URL.
SSL Protects Against
Data integrity. TLS ensures content has not been modified or tampered with during transmission.
SSL Does Not Protect Against
Post-decryption data handling. Once data reaches the server, SSL provides no protection over how it’s stored, processed, or accessed.
What Information Does an SSL Certificate Contain?
Every SSL certificate is a structured digital document. If you look at one closely in your browser, you’ll see the following fields:
Field
What It Contains
Domain Name(s)
The specific domain or domains the certificate is authorized to cover
Subject Alternative Names (SANs)
Additional domains or subdomains included under the same certificate
Organization Name
The verified legal name of the organization; present on OV and EV certificates only
Certificate Authority
The CA that issued and digitally signed the certificate
Issue and Expiration Date
The validity window; expired certificates trigger browser warnings and break trust immediately
Public Key
The cryptographic key used to initiate encrypted communication with the server
CA Digital Signature
The CA’s cryptographic signature, confirming the certificate’s authenticity and integrity
Certificate Serial Number
A unique identifier assigned by the CA, used for tracking and revocation
Field
Domain Name(s)
What It Contains
The specific domain or domains the certificate is authorized to cover
Field
Subject Alternative Names (SANs)
What It Contains
Additional domains or subdomains included under the same certificate
Field
Organization Name
What It Contains
The verified legal name of the organization; present on OV and EV certificates only
Field
Certificate Authority
What It Contains
The CA that issued and digitally signed the certificate
Field
Issue and Expiration Date
What It Contains
The validity window; expired certificates trigger browser warnings and break trust immediately
Field
Public Key
What It Contains
The cryptographic key used to initiate encrypted communication with the server
Field
CA Digital Signature
What It Contains
The CA’s cryptographic signature, confirming the certificate’s authenticity and integrity
Field
Certificate Serial Number
What It Contains
A unique identifier assigned by the CA, used for tracking and revocation
Anyone can see most of these fields. Click the padlock icon in the address bar to check a site’s certificate. This is a good habit for security-conscious users who want to know what a certificate really says, not just whether one exists.
SSL Certificate Management: Enterprise Challenges and Best Practices
Large-scale certificate management poses legitimate operational and security risks. The root cause of nearly all certificate-related incidents is poor visibility into the certificates within an organization, their locations, and their expiration dates.
Expired certificates trigger browser warnings and service disruptions—and unmanaged certificates routinely surface during attack surface assessments.
Best Practices for Managing the Certificate Lifecycle
- Build a certificate inventory. Identify every certificate present within the organization (domain name, issuing CA, expiration date, responsible team, and affected systems). This should include internal certificates created for Service-to-Service communication, not just public-facing certificates. You cannot manage what you cannot see.
- Automate the renewal process. Manual renewal creates unnecessary risk. Use the ACME Protocol for automated renewal, if available, and set up alerts at 60, 30, and 14 days before the certificate’s expiration. As part of formal change management processes, include renewals.
- Monitor certificate transparency logs. Certificate Transparency Logs are public, append-only records of every certificate issued by trusted Certificate Authorities. Set up alerting for any certificate issued for your domains (and their sub-domains), even if it is a sub-domain that you did not anticipate. Issuance of unauthorized certificates may be an early indicator of phishing infrastructure and/or Brand Impersonation Campaigns.
- Ensure your organization’s TLS configuration is secure. Check every system for its support of different versions of TLS and disable SSL 3.0, TLS 1.0, and TLS 1.1. Mandate a minimum of TLS 1.2 and use TLS 1.3 whenever possible.
- Evaluate the risks associated with using wildcard certificates. When there are high-value and/or sensitive subdomains, consider evaluating the risk of using individually scoped certificates as opposed to wildcard certificates.
- Include certificates in vendor risk assessments. Add certificate hygiene and TLS configuration to vendor security questionnaires and contract renewals.
Emerging Trends in Certificate and Encryption Security
The role of certificate management in organizations has changed. This is due to various advancements, including:
Certificate Automation
Many organizations have started using automated certificate management protocols (such as ACME) and new tools to manage certificates. Manual certificate management methods are no longer viable for large-scale use, as many organizations move toward shorter certificate validity terms. As the CA/browser forum continues to reduce the validity period of certificates, automation will become mandatory.
Monitoring of Certificate Transparency Logs
Monitoring certificate transparency logs is becoming more than just a compliance checkbox; security professionals increasingly use it as an early warning system to detect unauthorized certificate issuances and identify phishing infrastructure.
Mutual TLS and Zero Trust
Mutual TLS is a required component of zero-trust architectures. In turn, the certificate management process will need to evolve beyond just protecting the web and provide strong authentication between services. As such, CISOs and security architects should view crypto agility (the capability to replace cryptographic algorithms without requiring a complete overhaul of the system) as a minimum design criterion when creating new systems.
Quantum Resistant Cryptography
TLS currently uses mathematics that researchers are actively trying to break using quantum computers. NIST’s post-quantum cryptographic standards will require certificate management systems to evolve—CISOs who aren’t planning that transition alongside zero-trust implementation are already behind.
How SSL Certificates Fit Into a Broader Cybersecurity Strategy
Certificates are the basic building blocks for your organization’s security needs as they encrypt your data in transit. However, they do nothing to stop phishing scams, account takeovers, malware, or insider threats. A mature, multi-layered defense-in-depth security program incorporates SSL, along with solutions to secure against those threats that SSL can’t, like:
- Email security: Stops phishing attempts from reaching an HTTPS phishing site by intercepting them before they reach the site.
- URL and web filtering: Provides additional contextual analysis of URLs beyond just the validity of a URL’s certificate. This includes analysis of the age of a URL’s domain name, its hosting infrastructure, and the behavioral characteristics of a link.
- Identity and access management (IAM): Secures usernames and passwords if a phishing scam convinces a user that a site is legitimate.
- Data loss prevention (DLP): Encrypts your data in use and at rest. DLP provides an additional layer of security but does not rely on encrypting your data to protect it.
- Identity threat detection and response (ITDR): Identifies and contains threats that are using SSL to hide malicious activity.
For security architects, certificate infrastructure intersects with IAM, Public Key Infrastructure (PKI), zero trust architecture, and network security architecture. As such, certificate infrastructure should receive the same level of planning and strategy as all other foundational security components.
Stay Ahead of Tomorrow’s Cyber Threats with Proofpoint
As attackers identify new ways to exploit vulnerabilities across people and technology, the concepts that shape modern cybersecurity continue to evolve. Today’s cyber threats don’t stop at the network perimeter; they target people and collaboration platforms, exploit trusted systems, and move laterally across cloud environments in ways that conventional security measures are not designed to handle. Translating awareness into an impenetrable security posture requires the right combination of technology, processes, and human-focused solutions that account for how attacks actually unfold. Proofpoint brings together the latest threat intelligence and integrated security capabilities that protect organizations across the channels attackers use most. This is why thousands of organizations worldwide trust Proofpoint to help them stay ahead of threats that traditional defenses were never built to stop.
Ensure your team stays ahead of tomorrow’s threats, and contact Proofpoint to learn more.
Related Resources
The latest news and updates from Proofpoint, delivered to your inbox.
Sign up to receive news and other stories from Proofpoint. Your information will be used in accordance with Proofpoint’s privacy policy. You may opt out at any time.