# Policy Violation Alerts

Policy Violation Alerts in CERTInext notify administrators and security teams when certificates fail to comply with defined security, cryptographic, or governance policies. These alerts help organizations identify weak, misconfigured, or unauthorized certificates before they introduce security or compliance risk.

Policy violation monitoring applies to:

* Certificates issued through CERTInext
* Certificates discovered using Bots
* Certificates identified via Certificate Transparency (CT) logs
* Public and private certificates across all environments

#### How Policy Evaluation Works

CERTInext continuously evaluates certificates against configured policy rules. Policy checks are performed whenever:

* A certificate is issued or renewed
* A certificate is discovered through a scan
* A certificate is updated or re-evaluated during monitoring

Each certificate is assessed in real time to determine whether it complies with organizational security and trust requirements.

#### Types of Policy Violations Detected

Policy Violation Alerts may be generated for certificates that violate rules such as:

* **Cryptographic Weakness**
  * Weak key sizes
  * Deprecated or insecure algorithms
  * Unsupported protocol versions
* **Trust and Issuer Violations**
  * Certificates issued by unapproved or unknown CAs
  * Invalid or incomplete trust chains
  * Misaligned CA types (public vs private)
* **Configuration and Usage Violations**
  * Excessive validity periods
  * Certificates deployed outside approved environments
  * Certificates discovered without ownership or approval
* **Governance and Compliance Violations**
  * Certificates issued outside defined workflows
  * Unauthorized public certificate issuance detected via CT logs

These violations are classified based on severity to help teams prioritize remediation.

#### What Triggers a Policy Violation Alert

A Policy Violation Alert is triggered when:

* A certificate no longer meets defined policy requirements
* A newly discovered certificate violates an active policy
* A previously compliant certificate becomes non-compliant due to policy changes

Once triggered, the alert remains active until the violation is resolved or the certificate is explicitly exempted.

#### Identifying Policy Issues

Users can identify policy violations through:

* Policy Violation Alerts highlighting non-compliant certificates
* Dashboards and KPIs showing counts of violating certificates
* Certificate Inventory displaying violation status and affected rules
* Reports summarizing compliance posture across environments

Each alert links directly to the affected certificate, allowing users to view detailed violation reasons and impacted policies.

#### Responding to Policy Violation Alerts

CERTInext enables direct remediation once a violation is identified. Depending on the issue, teams can:

* Replace certificates with compliant cryptographic parameters
* Renew certificates using approved profiles or CAs
* Revoke certificates that pose security risk
* Decommission certificates that are unauthorized or no longer required
* Update deployment configurations through provisioning workflows

After remediation, CERTInext automatically re-evaluates the certificate and clears the alert once compliance is restored.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.certinext.io/documentation/monitoring-alerts-and-reporting/policy-violation-alerts.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
