Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

NIST Issues Guidance for Dealing With a CA Compromise

Responding to a CA Compromise – Is Your Organization Prepared?

In last month’s Information Technology Laboratory (ITL) Bulletin, the National Institute on Standards and Technology (NIST) focused on offering guidance for incident response teams dealing with the aftermath of a Certificate Authority (CA) breach, an issue that is worth examining if your organization uses PKI in any capacity.

Responding to a CA Compromise – Is Your Organization Prepared?

In last month’s Information Technology Laboratory (ITL) Bulletin, the National Institute on Standards and Technology (NIST) focused on offering guidance for incident response teams dealing with the aftermath of a Certificate Authority (CA) breach, an issue that is worth examining if your organization uses PKI in any capacity.

Digital X.509 certificates have become the de-facto standard for ensuring online trust. Nearly all government and private-sector organizations use them broadly for SSL, TLS, and other security protocols, explained Venafi, who co-wrote the bulletin.

Managing Digital CertificatesMoreover, Venafi adds, large organizations may use thousands and even tens of thousands of certificates and encryption keys—issued from internal and external CAs—in their data centers, private clouds, and increasingly on mobile devices to authenticate systems and users and to encrypt communications.

Thus, CAs, certificates, and private keys have become high-value targets for cybercriminals in search of sensitive government and corporate information. In 2011, the DigiNotar and Comodo breaches left many organizations confused as they attempted to protect their assets in the wake of nearly back-to-back breaches at well known CAs.

Microsoft’s recent admission that a certificate compromise help propagate the Flame Trojan only compounds the issue. The problem is, organizations of all sizes use PKI on different scales, and on top of that, some of them use it incorrectly – such as improper implementation of SSL. So when a CA is breached, the aftermath can be just as painful as the breach, but it doesn’t have to be.

The ITL issued in July from the NIST addresses the risks of certificate authority (CA) compromises, and offers guidance on how to prepare for and respond to a CA compromise that results in fraudulently issued security certificates.

“Certificate authorities have increasingly become targets for sophisticated cyberattacks, particularly as the use of digital certificates for Secure Sockets Layer (SSL) has become widespread,” said Paul Turner, vice president of products and strategy at Venafi.

Responding to a CA compromise isn’t easy, and could entail replacing all user or device certificates, or even trust anchors from the compromised CA itself, something many organizations would be challenged by if they don’t maintain an inventory of certificate locations and owners.

Advertisement. Scroll to continue reading.

To avoid this, experts say that organizations must establish CA-compromise preparation and response plans.

“Because certificates are typically installed and managed by individual administrators in disparate departments, most organizations and executives are not aware of their dependence on certificates for security. Nor are they aware of the significant disruption to business operations that would result if they had to replace all affected certificates following a CA compromise,” turner added.

“If enterprises are not prepared to respond to a CA compromise, they have overlooked business continuity planning that could prevent extended downtime for a majority of their applications and systems,” Turner said.

The bulletin itself is available here

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...