{"id":8157,"date":"2019-08-27T08:34:21","date_gmt":"2019-08-27T12:34:21","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8157"},"modified":"2026-01-19T09:46:33","modified_gmt":"2026-01-19T14:46:33","slug":"mitigate-security-threats","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/","title":{"rendered":"Mitigate Security Threats Through Digital Certificate Policy Enforcement"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg\" alt=\"\" class=\"wp-image-8158\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DBS_CAA_Records_Callout-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DBS_CAA_Records_Callout-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DBS_CAA_Records_Callout.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year<sup>[1]<\/sup>. About 74% of enterprises have seen system outages due to unplanned certificate expiration<sup>[2]<\/sup>, and over 50% have a lost or rogue digital certificate<sup>[3]<\/sup>.<\/p>\n\n\n\n<p>It\u2019s not uncommon for a company to find they don\u2019t have a full accounting\nof all the digital certificates used within their business; for large\norganizations, an audit usually reveals the use of multiple providers. Digital\ncertificates are easily purchased online with a credit card and have a maximum\nvalidity of two years, which means keeping up with renewal notices from various\nproviders, and preventing expirations that could cause catastrophic service\noutages and data breaches becomes an uphill task.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-default is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>In December 2018, millions of people in the UK woke up to &#8216;No Service&#8217; alerts when a mobile provider experienced an overnight network outage. This affected a number of networks, and was traced back to an expired certificate. \u2013 BBC News<sup>[4]<\/sup><\/em><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>In 2017, a critical digital certificate that had been expired for over two months resulted in the failure of an organization\u2019s monitoring device to detect a data breach where \u00a0customer information was stolen, affecting nearly 150M people. Over half a million in fines was imposed on the breached company, and millions more have been set aside for breach payouts. \u2013 Forbes<sup>[5]<\/sup> and The Wall Street Journal<sup>[6]<\/sup><\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Companies need a better strategy in managing their digital certificate\nportfolio. An easy, low cost, low effort mechanism is to employ the use of Certificate\nAuthority Authorization (CAA) Records. <strong><em>However, our sample analysis of 2,000 global\ncompanies\u2019 domains reveal only 3% are actively using CAA records.<\/em><\/strong><\/p>\n\n\n\n<p>At a 3% adoption rate, companies may not be capitalizing on this\ntechnical control due to:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Lack of awareness<\/li>\n\n\n\n<li>Complexity in implementation between the<br \/>different domain name system (DNS) and digital certificate providers they use<\/li>\n<\/ol>\n\n\n\n<p><strong>So, what\u2019s a CAA record?<\/strong><\/p>\n\n\n\n<p>A CAA record is a resource record held on a zone file that allows the\ndomain owner to indicate which Certificate Authorities (CAs) are authorized to\nissue a certificate for a given domain name. <\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\n  <strong>CAA record added<\/strong>\n  <\/td><td>\n  <strong>Digital certificate requested<\/strong>\n  <\/td><td>\n  <strong>Implications<\/strong>\n  <\/td><\/tr><tr><td>\n  Yes\n  <\/td><td>Request matches record.   <\/td><td>Certificate issued according to record.   <\/td><\/tr><tr><td>\n  Yes\n  <\/td><td>Request does not match record.   <\/td><td>Certificate not issued, preventing unauthorized certificates from being issued.   <\/td><\/tr><tr><td>\n  No\n  <\/td><td>No record exists for matching.   <\/td><td>Certificate issued according to requests, including unauthorized ones.   <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Better digital certificate\nmanagement<\/strong><\/p>\n\n\n\n<p>By adding CAA records, you are able to control the CAs that your\ncompany uses. This exercise supports the consolidation of your providers and\nreduces the overall cost of management that comes with multiple disparate\nproviders, also greatly reducing the risk of an expiration.<\/p>\n\n\n\n<p><strong>Enforce your company\u2019s policy<\/strong><\/p>\n\n\n\n<p>A CAA record ensures that only your chosen provider can issue a\ncertificate for your domain names. This is an essential technical control\nallowing for policy enforcement, as employees will not be able to purchase\nadditional certificates from non-authorized CAs. Importantly, you can create a\nCAA record which will report any attempted policy violations to a chosen email\naddress.<\/p>\n\n\n\n<p><strong>Ensure the use of high\nvalidation digital certificates<\/strong><\/p>\n\n\n\n<p>In the future*, apart from defining your preferred CA, you\u2019ll be able\nto stipulate the level of validation acceptable when adding a digital\ncertificate. The higher the level of validation, the more confidence it gives\nsite visitors that they are accessing a legitimate site. With domain validation\n(DV) certificates increasingly used by cyber criminals to falsely portray\nlegitimacy, CSC recommends using CAA records to stipulate the use of\norganization validation (OV) and extended validation (EV) certificates where\nnecessary. <em>*date to be confirmed<\/em><\/p>\n\n\n\n<p><strong>Mitigate cyber threat<\/strong><\/p>\n\n\n\n<p>The existence of a CAA record will add a layer of security that\nprevents cyber criminals from adding encryption or HTTPS with free, low\nvalidation digital certificates that do not match your records on a site to\nfool targets in a domain shadowing attack.<\/p>\n\n\n\n<p>CAA records improve the management of digital certificates at the\npolicy and operation levels, as well as thwart the advances of cyber criminals;\nthey play an important role in developing a multi-layered defense-in-depth\napproach that every company\u2019s domain security should consider.<\/p>\n\n\n\n<p>Partner with an enterprise-class provider who understands your business\npriorities, is able to consolidate your digital assets, and has the tools to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assess and identify your vital domains <\/li>\n\n\n\n<li>Help develop your digital certificate policy<\/li>\n\n\n\n<li>Implement CAA records within your DNS zone files<\/li>\n<\/ul>\n\n\n\n<p>In doing so, only authorized certificates are issued, reducing security\nrisks, and ensuring company policy compliance. <\/p>\n\n\n\n<p>Being the trusted partner able to serve as the single point of contact\nfor our clients\u2019 domains, DNS, and digital certificate portfolios, we encourage\nthem to add CAA records to their DNS zones files, even at the time of domain registration.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.cscdbs.com\/en\/contact-us\/\">Request a consultation to learn how we can help you enforce your digital certificate policy.<\/a><\/strong><br \/><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<p>[1] Aberdeen Group<\/p>\n\n\n\n<p>[2] Ponemon Institute<\/p>\n\n\n\n<p>[3] TechTarget<\/p>\n\n\n\n<p>[4] BBC News: <a href=\"https:\/\/www.bbc.com\/news\/business-46464730\">bbc.com\/news\/business-46464730<\/a><\/p>\n\n\n\n<p>[5] Forbes: <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/07\/22\/equifax-just-got-fined-up-to-700-million-for-that-massive-2017-hack\/#b5583993e96d\">forbes.com\/sites\/thomasbrewster\/2019\/07\/22\/equifax-just-got-fined-up-to-700-million-for-that-massive-2017-hack\/#b5583993e96d<\/a><\/p>\n\n\n\n<p>[6] The Wall Street Journal: <a href=\"https:\/\/www.wsj.com\/articles\/equifax-security-showed-signs-of-trouble-months-before-hack-1506437947\">wsj.com\/articles\/equifax-security-showed-signs-of-trouble-months-before-hack-1506437947<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year[1]. About 74% of enterprises have seen system outages due to unplanned certificate expiration[2], and over 50% have a lost or rogue digital certificate[3]. It\u2019s not uncommon for a company to find they don\u2019t have a full accounting [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,547,548,521],"tags":[],"class_list":["post-8157","post","type-post","status-publish","format-standard","hentry","category-brands","category-domain-management","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC<\/title>\n<meta name=\"description\" content=\"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC\" \/>\n<meta property=\"og:description\" content=\"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-27T12:34:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T14:46:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Mitigate Security Threats Through Digital Certificate Policy Enforcement\",\"datePublished\":\"2019-08-27T12:34:21+00:00\",\"dateModified\":\"2026-01-19T14:46:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DBS_CAA_Records_Callout-1024x536.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Management\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/\",\"name\":\"Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DBS_CAA_Records_Callout-1024x536.jpg\",\"datePublished\":\"2019-08-27T12:34:21+00:00\",\"dateModified\":\"2026-01-19T14:46:33+00:00\",\"description\":\"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DBS_CAA_Records_Callout-1024x536.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DBS_CAA_Records_Callout-1024x536.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/mitigate-security-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitigate Security Threats Through Digital Certificate Policy Enforcement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC","description":"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC","og_description":"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises","og_url":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-08-27T12:34:21+00:00","article_modified_time":"2026-01-19T14:46:33+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Mitigate Security Threats Through Digital Certificate Policy Enforcement","datePublished":"2019-08-27T12:34:21+00:00","dateModified":"2026-01-19T14:46:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg","articleSection":["Brand Protection","Domain Management","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/","url":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/","name":"Mitigate Security Threats Through Digital Certificate Policy Enforcement | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg","datePublished":"2019-08-27T12:34:21+00:00","dateModified":"2026-01-19T14:46:33+00:00","description":"Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DBS_CAA_Records_Callout-1024x536.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/mitigate-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Mitigate Security Threats Through Digital Certificate Policy Enforcement"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8157"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8157\/revisions"}],"predecessor-version":[{"id":15031,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8157\/revisions\/15031"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}