Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

How to Resolve Compliance Detection for TLS Certificate

Learn effective strategies for resolving compliance issues associated with TLS certificate detection in a concise and practical guide.

Written by Liam Downward

Updated at November 25th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Issue Cause Solution Notes

Issue

After installing an SSL certificate on a firewall, scans still detect the compliance failure:
"FAILED Compliance: TLS: No Self-Signed Certificates. Description: Ensure TLS certificates are signed by a separate issuer."

Cause

The scan is detecting that the certificate is self-signed or not signed by a publicly trusted certificate authority (CA). Compliance standards require the certificate to be signed by a CA to ensure authenticity and security.

Solution

Verify the Certificate

  • Confirm whether the SSL certificate installed on the firewall is signed by a publicly trusted CA.
  • If it is a self-signed certificate, replace it with one issued by a trusted CA.

Suppress the Compliance Detection (Optional)

  • If the certificate is intentionally self-signed and acceptable for your environment, you can suppress the CVE detection in the vulnerability scan.
  1. Navigate to Instance > Vulnerability Scan History in your CYRISMA dashboard.
  2. Locate and select the scan named 'One Time Firewall~202410101415'.
  3. Expand the scan results and review the bar graph. Select the affected IP address (e.g., 12.179.39.242) in the graph.
  4. Under the Root Cause section, locate the failed compliance entry for the CVE.
  5. Click the three dots under the "Action" column, and select Suppress to disable further detection of the issue.

Notes

  • Suppressing the CVE may bypass compliance warnings but does not resolve the underlying issue. Ensure this action aligns with your security policies.
  • If your certificate is signed by a CA and the issue persists, verify the certificate’s installation and configuration on the firewall.

 

compliance resolution tls detection tls detection certificate validation

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Schedule a Vulnerability Scan
  • Agent Status
  • Mitigation Dashboard
  • Website or External scan is being blocked or failed (IP's that need to be whitelisted)

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand