
2026-03-31
Modern organizations rely heavily on cryptography to protect data, systems, and communications. However, simply documenting cryptographic components is no longer enough.
In this #KEYMASTER session, Dr. Vladimir Soukharev, VP of Cryptography at InfoSec Global (part of Keyfactor), explores how organizations should move beyond Cryptographic Bills of Materials (CBOMs) toward proactive cryptographic posture management and better “crypto hygiene”.
Below are the key insights from that conversation, explaining why proactive discovery, prioritization, and lifecycle management are essential for secure cryptographic practices.
A CBOM (Cryptographic Bill of Materials) is essentially a list of cryptographic components used in a product—like a recipe’s ingredients list. It describes what algorithms, libraries, or cryptographic elements are included.
However, CBOMs have a fundamental limitation: they rely on trust. Organizations must assume that the listed components are accurate and complete.
To address this limitation, organizations are increasingly adopting proactive cryptographic discovery, which involves scanning systems directly to detect the cryptography actually being used. This approach provides:
In an ideal environment, companies would compare scan results against vendor-provided CBOMs to verify their accuracy. However, the CBOM concept is still evolving, and there is not yet a universally accepted standard for how it should be structured.
When organizations begin scanning their systems, they often encounter a new challenge: overwhelming volumes of results.
It’s common for discovery tools to produce hundreds of thousands—or even millions—of findings. Without a strategy to filter and prioritize them, the task becomes impossible for engineering teams.
To manage this complexity, organizations need a multi-dimensional prioritization approach, evaluating issues based on factors such as:
This prioritization allows teams to focus on the most critical weaknesses first instead of attempting to fix everything at once.
A key goal of cryptographic posture management is identifying and addressing the weakest links in the environment.
For example, teams should quickly flag and migrate away from deprecated algorithms such as:
Replacing them with modern alternatives such as AES and SHA-2/SHA-3 significantly improves security.
Another common mistake occurs during protocol upgrades. For instance, an organization may add support for TLS 1.2 or TLS 1.3, but forget to remove TLS 1.0.
If legacy versions remain enabled, attackers can simply negotiate the weaker protocol and bypass the upgrade entirely.
Although CBOMs and cryptographic inventories are related, they serve different purposes.
Organizations should use internal inventories to identify and fix problems before publishing a CBOM.
Maintaining strong cryptographic security requires more than discovery—it also requires the ability to change cryptography quickly.
This is where several capabilities become essential:
Together, these capabilities support what Vladimir describes as “cryptographic hygiene”—the ongoing practice of keeping cryptographic systems secure, modern, and well-maintained.

