
2026-03-25
Cryptography is the backbone of modern digital security, protecting sensitive data, communications, and systems. However, many organizations still treat cryptography as a “set it and forget it” technology. In reality, managing cryptographic assets requires continuous visibility and evaluation.
In this #KEYMASTER episode, Dr. Vladimir Soukharev, VP of Cryptography at InfoSec Global (part of Keyfactor), discusses with Sven Rajala why organizations need to move beyond traditional certificate management and toward comprehensive cryptographic posture management.
Many security teams are familiar with Certificate Lifecycle Management (CLM), which focuses on managing digital certificates. While CLM is important, it only addresses a small portion of the overall cryptographic environment.
Cryptography includes far more than certificates. Organizations must also account for:
CLM might cover roughly 20% of the total cryptographic ecosystem, leaving a significant portion unmanaged if teams stop there. To truly understand the risk, organizations need visibility into all cryptographic assets, not just certificates.
To manage cryptographic assets effectively, organizations need a clear inventory and evaluation framework. Several dimensions should be considered when assessing cryptographic exposure.
Teams should evaluate how secure each cryptographic component is. This includes checking whether algorithms are modern, supported, compliant, and considered safe.
For example, deprecated algorithms, such as SHA-1, still appear in many environments despite being considered insecure for years.
Not all vulnerabilities carry the same risk. The impact depends heavily on where the cryptography is used.
An outdated algorithm might be less concerning if it’s rarely used or exists in a low-risk system. However, the same weakness becomes critical if it protects high-value assets or “crown jewel” systems.
Organizations must also consider future cryptographic threats, particularly the transition to post-quantum cryptography.
Unlike previous cryptographic transitions—such as moving from RSA to elliptic-curve cryptography—quantum risks are more severe. If organizations fail to migrate in time, classical cryptography could become completely vulnerable rather than just slightly weaker.
One of the biggest challenges in cryptographic posture management is simply discovering all cryptographic assets.
Cryptography exists everywhere in modern systems, often in places organizations don’t expect.
In one example discussed in the conversation, scanning a brand-new laptop with a default Windows installation revealed hundreds of cryptographic artifacts already present, even before installing additional software.
This illustrates how widespread cryptography is across operating systems, applications, and libraries.
Another challenge arises when older cryptographic implementations remain in systems even after newer ones are introduced. Teams may upgrade to stronger algorithms but fail to remove legacy versions, leaving unnecessary vulnerabilities behind.
Many organizations rely heavily on third-party applications and libraries. In these cases, teams often lack access to the source code.
To maintain visibility, organizations must be able to:
Even without source code access, binary scanning can reveal what cryptography is present in third-party software and help detect weak or outdated implementations.
Since security is only as strong as the weakest link, identifying these hidden risks is essential.
Cryptographic posture management is not just about identifying vulnerabilities—it also provides a structured way to enforce internal policies and meet external compliance requirements.
At its core, it allows organizations to define custom cryptographic policies that specify what is acceptable within their environment. These policies can include rules around:
Once these policies are established, organizations can continuously scan their systems and automatically flag any violations. For example, even a strong algorithm like AES could be flagged if it doesn’t align with a specific internal policy or regulatory requirement. Or an unexpected foreign cryptographic algorithm that might be cryptographically secure, yet not compliant. This could also raise questions about why it is there in the first place.
This approach shifts compliance from a manual, audit-driven process to an automated and continuous practice, giving teams real-time visibility into their security posture.
One important reality in cryptography is that nothing is truly unbreakable.
Instead, cryptographic security is based on the practical difficulty of breaking an algorithm. If cracking it would take tens of thousands of years with current computing power, it is considered secure for practical purposes. But if the same process might take only months or years, it becomes a serious risk.
Understanding this balance—and continuously monitoring cryptographic strength—is the core purpose of cryptographic posture management.

