Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

NIST Issues Guidance for Dealing With a CA Compromise

Responding to a CA Compromise – Is Your Organization Prepared?

In last month’s Information Technology Laboratory (ITL) Bulletin, the National Institute on Standards and Technology (NIST) focused on offering guidance for incident response teams dealing with the aftermath of a Certificate Authority (CA) breach, an issue that is worth examining if your organization uses PKI in any capacity.

Responding to a CA Compromise – Is Your Organization Prepared?

In last month’s Information Technology Laboratory (ITL) Bulletin, the National Institute on Standards and Technology (NIST) focused on offering guidance for incident response teams dealing with the aftermath of a Certificate Authority (CA) breach, an issue that is worth examining if your organization uses PKI in any capacity.

Digital X.509 certificates have become the de-facto standard for ensuring online trust. Nearly all government and private-sector organizations use them broadly for SSL, TLS, and other security protocols, explained Venafi, who co-wrote the bulletin.

Managing Digital CertificatesMoreover, Venafi adds, large organizations may use thousands and even tens of thousands of certificates and encryption keys—issued from internal and external CAs—in their data centers, private clouds, and increasingly on mobile devices to authenticate systems and users and to encrypt communications.

Thus, CAs, certificates, and private keys have become high-value targets for cybercriminals in search of sensitive government and corporate information. In 2011, the DigiNotar and Comodo breaches left many organizations confused as they attempted to protect their assets in the wake of nearly back-to-back breaches at well known CAs.

Microsoft’s recent admission that a certificate compromise help propagate the Flame Trojan only compounds the issue. The problem is, organizations of all sizes use PKI on different scales, and on top of that, some of them use it incorrectly – such as improper implementation of SSL. So when a CA is breached, the aftermath can be just as painful as the breach, but it doesn’t have to be.

The ITL issued in July from the NIST addresses the risks of certificate authority (CA) compromises, and offers guidance on how to prepare for and respond to a CA compromise that results in fraudulently issued security certificates.

“Certificate authorities have increasingly become targets for sophisticated cyberattacks, particularly as the use of digital certificates for Secure Sockets Layer (SSL) has become widespread,” said Paul Turner, vice president of products and strategy at Venafi.

Advertisement. Scroll to continue reading.

Responding to a CA compromise isn’t easy, and could entail replacing all user or device certificates, or even trust anchors from the compromised CA itself, something many organizations would be challenged by if they don’t maintain an inventory of certificate locations and owners.

To avoid this, experts say that organizations must establish CA-compromise preparation and response plans.

“Because certificates are typically installed and managed by individual administrators in disparate departments, most organizations and executives are not aware of their dependence on certificates for security. Nor are they aware of the significant disruption to business operations that would result if they had to replace all affected certificates following a CA compromise,” turner added.

“If enterprises are not prepared to respond to a CA compromise, they have overlooked business continuity planning that could prevent extended downtime for a majority of their applications and systems,” Turner said.

The bulletin itself is available here

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.