Cloud Security

Google Cloud Users Can Now Automate TLS Certificate Lifecycle

Google makes ACME API available to all Google Cloud users to allow them to automatically acquire and renew TLS certificates for free.

Google makes ACME API available to all Google Cloud users to allow them to automatically acquire and renew TLS certificates for free.

Google on Thursday announced the availability of its Automatic Certificate Management Environment (ACME) API for all Google Cloud users, allowing them to automatically acquire and renew TLS certificates for free.

The ACME protocol was designed to automate TLS certificate lifecycle through APIs that are supported by dozens of clients, and has become the standard for certificate management across the internet, with most TLS certificates in the WebPKI being issued by ACME certificate authorities.

The protocol’s automated certificate renewal capabilities ensure that users do not experience outages, which are common with manual certificate renewals.

Now available to all users with a Google Cloud account, the Google Trust Services ACME API has been used to issue over 200 million certificates during the preview period. According to Google, the API provides the same compatibility that major services offer.

“The service recently expanded support for Google Domains customers. By further opening up the service, we’re adding another tool to Google’s Cyber Security Advancements, keeping individuals, businesses, and governments safer online through highly trusted and free certificates,” Google says.

To enhance the certificate ecosystem, the internet giant also announced the ACME Renewal Information (ARI) standard for renewal management and the general availability of multi-perspective domain validation (MPDV), for an enhanced certificate issuance process.

An Internet Engineering Task Force (IETF) draft authored by Let’s Encrypt, ARI is an extension to the ACME protocol that helps renew certificates if revocation occurs before expiration.

Via an API, it informs service operators when a certificate must be replaced, helping with the management of large certificate populations.

Advertisement. Scroll to continue reading.

MPDV ensures that domain control verification is performed from multiple locations, to improve the reliability of validation by preventing localized attacks that attempt to trick the verification checks.  

Related: NSA Warns of Risks Posed by Wildcard Certificates, ALPACA Attacks

Related: Bug Forces Let’s Encrypt to Revoke 3 Million Certificates

Related: Mozilla Joins Apple, Google in Reducing TLS Certificate Lifespans

Related Content

Malware & Threats

Researchers can earn as much as $450,000 for a single vulnerability report as Google boosts its mobile vulnerability rewards program.

Identity & Access

Venafi introduced a 90-Day TLS Readiness solution to help enterprises prepare for Google’s proposed 90-day limit for the lifecycle of a digital certificate.

Malware & Threats

In 2023, Google said it blocked 2.28 million bad applications from being published on Google Play and banned 333,000 developer accounts.

Vulnerabilities

Google paid out $10 million via its bug bounty programs in 2023, bringing the total to nearly $60 million since 2010.

Artificial Intelligence

Google’s new AI Cyber Defense Initiative focuses on boosting cybersecurity through artificial intelligence.

Government

More than 60 of the Adobe, Google, Android, Microsoft, Mozilla and Apple zero-days that have come to light since 2016 attributed to spyware vendors. 

Application Security

Google announces $1 million investment in improving Rust’s interoperability with legacy C++ codebases.

Application Security

Google has released its fuzzing framework in open source to boost the ability of developers and researchers to identify vulnerabilities.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version