Updated on 2025-08-25 GMT+08:00

Certificate Source Check

Rule Details

Table 1 Rule details

Parameter

Description

Rule Name

cdn-use-my-certificate

Identifier

Certificate Source Check

Description

If a domain has its Certificate Source set to My certificate, this domain is non-compliant.

Tag

cdn

Trigger Type

Configuration change

Filter Type

cdn.domains

Rule Parameters

None

Application Scenarios

CDN supports your own certificates or SCM certificates. For details, see Configuring an HTTPS Certificate.

You are advised to use SCM certificates. Using your own certificates may have the following problems:

  • Private key leakage: If the private key is not properly stored, attackers can steal it, decrypt sensitive data, or launch man-in-the-middle attacks.
  • Weak encryption algorithm: If your own certificate uses an outdated algorithm, it may be attacked by brute force.
  • Complex certificate lifecycle management: You need to manually or build a system to handle all lifecycle operations of certificates, such as issuing, deploying, renewing, and revoking certificates. As a result, certificates may expire due to negligence.
  • Insufficient support for automation tools: Your own certificates need to be manually uploaded and updated, increasing O&M burdens.
  • Complex team collaboration: Development, O&M, and security teams need to collaboratively manage certificate policies, increasing communication complexity.

Solution

Use SCM certificates instead of your own certificates.

Rule Logic

  • If the CDN certificate source is your own certificate, the check result is non-compliant.
  • If the CDN certificate source is not your own certificate, the check result is compliant.