Skip to Main Content
Cloud Management and AIOps


This is an IBM Automation portal for Cloud Management, Technology Cost Management, Network Automation and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Under review
Workspace Concert
Created by Guest
Created on Aug 20, 2025

Automated Certificate Policy Updates Based on NIST SP 800-52 and Improved Signature Algorithm Detection

Title
Automated Certificate Policy Updates Based on NIST SP 800-52 and Improved Signature Algorithm Detection

Solution Value Statement
Enable IBM Concert to automatically update certificate policy rules based on NIST SP 800-52 guidance and improve signature algorithm detection using Object Identifiers (OIDs), ensuring stronger cryptographic compliance and reduced manual effort.

Problem Description
Currently, IBM Concert requires users to manually manage certificate policy rules related to cryptographic standards such as hash algorithms and key lengths.
Who is affected: Security teams and compliance officers responsible for enforcing cryptographic standards.
What the current process looks like: Users must manually track updates to NIST SP 800-52 and adjust policies accordingly. Signature algorithm detection relies on text matching (e.g., “SHA-256”), which is error-prone and inconsistent.
Why it's problematic: Manual updates are time-consuming and error-prone, and text-based detection can miss or misclassify algorithms, leading to compliance gaps.

Proposed Solution
Enhance IBM Concert’s certificate management capabilities to:

  • Automatically update certificate policy rules when NIST SP 800-52 is revised

  • Use Object Identifiers (OIDs) to detect signature algorithms instead of relying on text matching

  • Provide visibility into which certificates comply or violate updated standards

  • Offer recommendations or automated remediation actions for non-compliant certificates

  • Include a reference to the NIST publication version used for policy enforcement

Customer Impact / Business Value
Compliance Assurance: Ensures alignment with evolving NIST cryptographic standards
Operational Efficiency: Reduces manual effort in updating and enforcing certificate policies
Accuracy: Improves detection of weak or deprecated algorithms using OIDs
Security Posture: Strengthens cryptographic hygiene across environments

Pilot or Validation Context
This request is based on real-world cryptographic policy enforcement challenges. The NIST SP 800-52r2 publication provides authoritative guidance on acceptable algorithms and key lengths, which customers are expected to follow.

Key Functional Requirements

  • Automated policy updates based on NIST SP 800-52 revisions

  • OID-based signature algorithm detection

  • Certificate compliance reporting and visualization

  • Integration with certificate discovery and posture workflows

  • Audit trail of policy changes and enforcement actions

Metrics for Success

  • Reduction in manual policy update tasks

  • Accuracy of algorithm detection using OIDs

  • Number of certificates flagged and remediated based on updated policies

  • Customer satisfaction with cryptographic compliance features

Original Aha idea:

We investigate the capability of Certificatioin management capability of IBM Concert.

Now we need to manage manually the Certificate policy for Hash algorithms or Key length. We think this is not ideal way.

Basically we subject to the guide of NIST SP 800−52, which signature algorithms is strong or not.

So when the NIST guide is updated, please update automatially the Certificate policy from the SaaS side.

-

And we don't think the text matching for algorithm name like SHA-256 or SHA256-RSA is not best way.

Each signature algorithm has its own Object ID, which can be fetched with openssl command and so on.

openssl x509 -in certificate.crt -text -noout

We think evaluation using OBJECTID is better way without ambiguity.

SIGNATURE ALGORITHM         OBJECTID                   STATUS
sha256WithRSAEncryption 1.2.840.113549.1.1.11 secure
sha1WithRSAEncryption 1.2.840.113549.1.1.5 INSECURE
ecdsa-with-SHA256 1.2.840.10045.4.3.2 secure
dsa-with-sha256 2.16.840.1.101.3.4.3.2 secure
Idea priority High