If you uploaded SSL certificates to Amazon Web Services for ELB (Elastic Load Balancing) or CloudFront (CDN), then you will want to keep an eye on the expiration dates and renew the certificates well before to ensure uninterrupted service.
If you uploaded the SSL certificates yourself, then of course at that time you set an official reminder to make sure that you remembered to renew the certificate. Right?
However, if you inherited an AWS account and want to review your company or client’s configuration, then here’s an easy command to get a list of all SSL certificates in IAM, sorted by expiration date.
aws iam list-server-certificates \ --output text \ --query 'ServerCertificateMetadataList[*].[Expiration,ServerCertificateName]' \ | sort
To get more information on an individual certificate, you might use something like:
certificate_name=... aws iam get-server-certificate \ --server-certificate-name $certificate_name \ --output text \ --query 'ServerCertificate.CertificateBody' \ | openssl x509 -text \ | less
That can let you review information like the DNS name(s) the SSL certificate is good for.
Exercise for the reader: Schedule an automated job that reviews SSL certificate expiration and generates messages to an SNS topic when certificates are near expiration. Subscribe email addresses and other alerting services to the SNS topic.
Read more from Amazon on Managing Server Certificates.
Note: SSL certificates embedded in web server applications running on EC2 instances would have to be checked and updated separately from those stored in AWS.