Skip to content

Inventory

The Inventory page is the central view of all discovered cryptographic assets. Every certificate, key, algorithm, and protocol found by sensors appears here with full metadata.

hidden Inventory table showing crypto assets with columns for name, type, algorithm, risk level, and lifecycle state


The main table displays all assets from the crypto_assets MongoDB collection. Each row shows:

ColumnDescription
NameHuman-readable identifier (e.g., “api.example.com TLS cert”)
TypeAsset type: certificate, private-key, public-key, symmetric-key, algorithm, protocol, signature
AlgorithmCryptographic algorithm (RSA-2048, ECDSA P-256, AES-256-GCM, etc.)
Key SizeBit length (2048, 256, 384)
Risk LevelQuantum risk classification (CRITICAL/HIGH/MEDIUM/LOW/NONE)
LifecycleCurrent state (active, suspended, compromised, etc.)
First SeenWhen the asset was first discovered
Last SeenMost recent scan that found this asset

Filter the inventory by:

  • Asset type — Certificate, private-key, public-key, symmetric-key, algorithm, protocol, signature
  • Quantum risk level — CRITICAL, HIGH, MEDIUM, LOW, NONE
  • Algorithm — RSA, ECDSA, AES-256, SHA-256, etc.
  • Lifecycle state — Active, suspended, deactivated, compromised, destroyed, revoked, pre-activation
  • Scanner source — Which sensor/scanner discovered the asset
  • Text search — Search by name, subject, issuer, or fingerprint

hidden Inventory filters panel showing type, risk, and algorithm dropdowns


Click any row to view full asset details:

  • Subject and Issuer DN
  • Serial number
  • Validity period (notValidBefore / notValidAfter)
  • Signature algorithm
  • Key usage and extended key usage
  • Subject Alternative Names (SANs)
  • Thumbprint / fingerprint
  • Certificate chain position
  • Algorithm and key size
  • Curve (for EC keys)
  • Key format (PEM, DER, JKS entry)
  • Associated certificate (if linked)
  • All discovery locations (where the asset was found)
  • Related assets (parent keystore, associated keys/certs)
  • Scan run history
  • Lifecycle state and reason

hidden Asset detail panel showing certificate properties and discovery locations


Assets are deduplicated by SHA-256 fingerprint. If the same certificate appears in multiple locations (e.g., deployed to 5 servers), it shows as one asset with multiple locations listed.

This prevents inventory bloat while maintaining full visibility into where each asset is deployed.


Change an asset’s lifecycle state directly from the inventory:

StateMeaning (NIST SP 800-57)
pre-activationGenerated but not yet in use
activeCurrently in operational use
suspendedTemporarily disabled
deactivatedPermanently removed from use
compromisedKey material may be exposed
destroyedCryptographically erased
revokedCertificate revoked by CA

Lifecycle Management


Save frequently used filter combinations for quick access. Saved searches are available to all users.