Skip to main content
Certificates Library Dashboard

Certificates Library Overview


Overview

The Certificates Library aggregates all SSL/TLS certificates discovered via ASM, VM, cloud integrations, or network scanners. Each certificate entry includes:
  • Expiry details
  • Signing authority
  • Mapped domains or services
  • Risk score & exposures
  • Validity status
  • Associations with other assets
AIM continuously monitors certificate freshness and flags expired or invalid certificates instantly.

Key Metrics & Analytics

Total Certificates

Number of certificates actively tracked in AIM.

Expired Certificates

Certificates past their expiration date, posing both availability and security risks.

Nearly Expired Certificates

Certificates approaching expiry thresholds defined by your organization (e.g., 30 days).

Invalid Certificates

Certificates that fail cryptographic, trust-chain, or configuration validation.

Certificate Validity Distribution

Shows how long certificates have before expiry:
  • < 1 Month
  • 1–3 Months
  • 3–6 Months
  • > 6 Months
Useful for renewal planning and outage prevention.

Validity Status Breakdown

Pie chart of:
  • Valid
  • Expired

Certificate Signing Authorities

Distribution of CA providers such as:
  • Let’s Encrypt
  • Cloudflare
  • CertUnity
  • Custom/Internal CA
Helpful for compliance and CA governance.
Certificate Distribution Charts

Certificate Analytics


Search, Filters & Sorting

The certificate catalog supports powerful filters:
FilterDescription
OwnersShow certificates assigned to a specific user/team.
RiskSort by automated risk score.
SourceFilter by discovery adapters (ASM, VM, SSL scanners).
hasVulnsShow certificates linked with vulnerabilities.
OrganizationsFilter by organization or CA issuing authority.
Date RangeFilter based on detection timeline.
All filters stack for precise narrowing of certificate datasets.

Certificate Table Columns

ColumnDescription
Asset ValueDomain or service the certificate belongs to.
SourceThe adapter that discovered it (e.g., sslcert).
Vuln CountNumber of vulnerabilities associated with this certificate.
Auto RiskAutomated risk score.
OwnerResponsible user or team.
TagsTags like SSL, Certificate, TLS.
AssociationsRelated assets (domains, IPs, APIs).
Detected OnFirst and last discovery timestamps.

Certificate Full View

Certificate Detail Page

Certificate Detail View

Certificate Summary

FieldDescription
Certificate ValueCN / SAN or linked domain.
Validity StatusValid / Expired / Invalid.
Expiry DateExact expiration timestamp.
Risk ScoreSystem-generated based on expiry, CA, and associations.
OwnerAssigned user or team.
EnvironmentBased on asset mappings (e.g., Prod, Staging).
LifecycleFirst Found / Last Found timelines.

Signing Authority Intelligence

AIM enriches each certificate with:
  • CA Name
  • Trust chain analysis
  • Issuer metadata
  • Key size & algorithm
This helps ensure cryptographic and compliance integrity.

Associated Assets

Certificates automatically link to:
  • Domains
  • Subdomains
  • APIs
  • IPs
  • Applications
This helps identify the impact radius of expired or invalid certificates.

How Certificates Are Discovered

AIM identifies certificates using:
  • ASM Adapter – external scans & exposed endpoints
  • VM Adapter – vulnerability correlation
  • SSL Cert Adapter – certificate-specific discovery
  • Cloud Integrations – Cloudflare, AWS ACM, etc.

Example Use Cases

🔐 Security Teams

Identify weak, expired, or untrusted certificates.

⚙️ DevOps / Platform Engineers

Prevent service outages caused by certificate expiry.

🛡 Compliance Teams

Ensure CA policies, key sizes, and renewal practices meet standards.

🚨 Incident Responders

Investigate compromised or misissued certificates.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.