SlideShare a Scribd company logo
New Window of Opportunity:
                                 Certificate Transparency -
                            A Certification Authority’s Perspective
                                 Ben Wilson, SVP DigiCert




Ben_at_digicert_dot_com     www.digicert.com   +1 (801) 877-2100
Introduction
          • Goals of Certificate Transparency:
                     – Provide insight into issued SSL certificates
                     – Provide better remediation services
                     – Ensure CAs are aware of what they issue
          • DigiCert supports the concept of transparent
            certificate practices and certificate logging:
                     – Voiced our support of transparency early on
                     – Already accessing Google’s log server
          • Some outstanding areas require discussion prior
            to advocating industry-wide implementation

©DigiCert, Inc. 2013. All Rights Reserved                             April 2013
Issuance Flow




©DigiCert, Inc. 2013. All Rights Reserved                   April 2013
Transparency
          • Benefits
                     – Fast detection = better mitigation
                     – Greater visibility = better accountability for domain
                       owners
                     – Visible trust in operations = increased trust for CAs
                     – Greater opportunity for discussion on certificates =
                       improvement in Internet security
          • Security
                     – Enables detection of problem and mis-issued
                       certificates
                     – Necessary for adequate remediation


©DigiCert, Inc. 2013. All Rights Reserved                                      April 2013
Public Logging
          • Public logging was discussed previously in CA /B Forum
                     – Action by a browser was needed to make it happen
          • Public log shines a light on CAs
          • Public log provides mitigation
                     – All of the incidents could have been more quickly detected
                       and remediated with CT
          • Public log helps researchers
          • Public log is detection in security
                     – Baseline requirements is prevention
                     – Revocation is remediation


©DigiCert, Inc. 2013. All Rights Reserved                                           April 2013
Security Improvement
          • Raises awareness of practices
                     – Allows broader observation of a CA’s practices
                     – Allows domain owners to identify illegitimate use
                       of domain names (Early Warning System)
          • Exposes weak points/players in ecosystem
                     – Enables research to identify improvement areas
          • Enables trust decisions for domain owners
                     – Self-regulating mechanism for the market

©DigiCert, Inc. 2013. All Rights Reserved                                  April 2013
Other Benefits
          • Backward compatible
          • Driving towards implementation
          • Expands the existing system
                     – SSL has a proven track record
                     – Lots of institutional knowledge
                     – Increasingly stringent standards
          • Avoids “unintended consequences” of new
            technology
          • Deployed by CAs and Browsers
                     – Web site operator participation is not required


©DigiCert, Inc. 2013. All Rights Reserved                                April 2013
Implementation
          • Obtained REST JSON API from Google (URL
            reference)
          • Identified log servers
                     – No new infrastructure
          • Updated our issuance code to communicate
            with log server
          • Created code to verify signed proof on
            response before embedding into certificate
          • Modified our certificate profile

©DigiCert, Inc. 2013. All Rights Reserved                    April 2013
Remaining Questions from CAs
          • Number of Proofs
             – Each proof increases certificate size
             – Increased certificate size hampers
               performance
          • Privacy, competitive business considerations
          • Level playing field requirement for all CAs
          • Exemptions for internal certificates
          • Log accessibility and resiliency of deployment

©DigiCert, Inc. 2013. All Rights Reserved                    April 2013
Log Server Considerations
            Model implementation provided by Google
              – Uses SQL light for log tree storage
              – Which CAs can add to a log?
              – What will be considered a trusted log?
          Security policy for trusted log operation is needed
                     – Identify desired uptime and performance objectives
                     – Scope broad enough to include entire system (e.g.
                       mitigating disruption due to log compromises)
                     – Perform risk assessment and adopt controls
                     – Policy adoption process needs to be quick / efficient


©DigiCert, Inc. 2013. All Rights Reserved                                      April 2013
Conclusion
          DigiCert supports Certificate Transparency because it
                  – Addresses vulnerabilities in the current trust model
                  – Creates transparency and accountability that will lead
                    to prevention and early detection of mis-issuances
                  – Is based on existing technologies that are easily
                    supported with industry coordination
                  – Enhances existing self-regulating mechanisms by
                    leveraging an existing, refined and time-tested CA trust-
                    anchor system while avoiding the “unintended
                    consequences” of new technology in unfamiliar space


©DigiCert, Inc. 2013. All Rights Reserved                                       April 2013

More Related Content

PDF
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
PPTX
SANS Critical Security Controls Summit London 2013
PPTX
Software-Defined Segmentation Done Easily, Quickly and Right
PDF
Managed firewall service.
PDF
Simplifying PCI on a PaaS Environment
PDF
INTRODUCTION TO IVANTI NEURONS
PDF
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
PDF
Managed Service Brochure
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
SANS Critical Security Controls Summit London 2013
Software-Defined Segmentation Done Easily, Quickly and Right
Managed firewall service.
Simplifying PCI on a PaaS Environment
INTRODUCTION TO IVANTI NEURONS
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Managed Service Brochure

What's hot (20)

PDF
DARPA: Cyber Analytical Framework (Kaufman)
PPTX
Vulnerability Testing Services Case Study
PDF
IT Service & Asset Management Better Together
PPTX
Ivanti remote worker ds
PDF
Secure Your Data with Fidelis Network® for DLP
PDF
David Klein - Defending Against Nation Sate Attackers & Ransomware
PDF
The Future of Technology Operations
PPTX
Sam Herath - Six Critical Criteria for Cloud Workload Security
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PPTX
A Primer on iOS Management and What's Changing
PDF
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
PPTX
On Common Ground: The Overlap of PCI DSS and Data Protection
PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
Fidelis Endpoint® - Live Demonstration
PPTX
Cybersecurity Implementation and Certification in Practice for IoT Equipment
PPTX
Best Practices for Cloud Security
PDF
What You Need To Know About The New PCI Cloud Guidelines
PPTX
From Physical to Virtual to Cloud
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
DARPA: Cyber Analytical Framework (Kaufman)
Vulnerability Testing Services Case Study
IT Service & Asset Management Better Together
Ivanti remote worker ds
Secure Your Data with Fidelis Network® for DLP
David Klein - Defending Against Nation Sate Attackers & Ransomware
The Future of Technology Operations
Sam Herath - Six Critical Criteria for Cloud Workload Security
Managing Multiple Assessments Using Zero Trust Principles
A Primer on iOS Management and What's Changing
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
On Common Ground: The Overlap of PCI DSS and Data Protection
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Fidelis Endpoint® - Live Demonstration
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Best Practices for Cloud Security
What You Need To Know About The New PCI Cloud Guidelines
From Physical to Virtual to Cloud
Defending the Data Center: Managing Users from the Edge to the Application
Ad

Viewers also liked (6)

PPTX
Decision criteria and analysis for hardware-based encryption
PPTX
141118 Thales contributions and benefits
PPTX
Protecting application delivery without network security blind spots
PPTX
Thales e-Security corporate presentation
PDF
SaaS Marketing Plan: 5 Ways to Get your B2B App to Sell Itself
PDF
Go to-market strategy for B2B SaaS companies
Decision criteria and analysis for hardware-based encryption
141118 Thales contributions and benefits
Protecting application delivery without network security blind spots
Thales e-Security corporate presentation
SaaS Marketing Plan: 5 Ways to Get your B2B App to Sell Itself
Go to-market strategy for B2B SaaS companies
Ad

Similar to New Window of Opportunity (20)

PPTX
Myths of validation
PDF
110307 cloud security requirements gourley
PDF
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
PPTX
Monitoring in the DevOps Era
PPTX
security and compliance in the cloud
PDF
Open Architecture: The Key to Aviation Security
PPTX
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
PDF
GCP Security Refresher and GKE Enterprise In Action
PDF
Improving Quality through Continuous Integration - A case study of CollabNet
PDF
2019 10-app gate sdp 101 09a
PPTX
Transforming cloud security into an advantage
PPTX
Rightscale Webinar: PCI in Public Cloud
POTX
Should healthcare abandon the cloud final
PDF
CAs And The New Paradigm Shift
PPTX
Logicalis BYOD Briefing
PDF
CSA Introduction 2013 David Ross
PDF
Introduction to CSA Australia 2013 by David Ross
PDF
Compliance in Public Cloud & CSA Framework
PPTX
Security Architecture Best Practices for SaaS Applications
PPTX
Cloud Security Zen: Principles to Meditate On
Myths of validation
110307 cloud security requirements gourley
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Monitoring in the DevOps Era
security and compliance in the cloud
Open Architecture: The Key to Aviation Security
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
GCP Security Refresher and GKE Enterprise In Action
Improving Quality through Continuous Integration - A case study of CollabNet
2019 10-app gate sdp 101 09a
Transforming cloud security into an advantage
Rightscale Webinar: PCI in Public Cloud
Should healthcare abandon the cloud final
CAs And The New Paradigm Shift
Logicalis BYOD Briefing
CSA Introduction 2013 David Ross
Introduction to CSA Australia 2013 by David Ross
Compliance in Public Cloud & CSA Framework
Security Architecture Best Practices for SaaS Applications
Cloud Security Zen: Principles to Meditate On

More from CASCouncil (20)

PDF
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
PPTX
Six Reasons http Will Become a Thing of the Past
PDF
What Kind of SSL/TLS Certificate Do I Need?
PPTX
Payments Security – Vital Information all Payment Processors need to know
PDF
TLS Certificates on the Web – The Good, The Bad and The Ugly
PDF
2016 IRS Free e-File Audit & Honor Roll
PDF
Symantec’s View of the Current State of ECDSA on the Web
PPTX
CA/Browser Forum—To effect positive changes to improve internet security
PDF
Update on the Work of the CA / Browser Forum
PDF
Extended Validation Builds Trust
PPTX
CA Day 2014
PPT
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
PDF
New Ideas on CAA, CT and Public Key Pinning for a Safer Internet
PDF
Alternatives and Enhancements to CAs for a Secure Web
PDF
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements
PPTX
State of the Web
PDF
Trust Service Providers: Self-Regulatory Processes
PDF
Certificates, Revocation and the new gTLD's Oh My!
PPTX
CA Self Regulation
PDF
Nation-State Attacks On PKI
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
Six Reasons http Will Become a Thing of the Past
What Kind of SSL/TLS Certificate Do I Need?
Payments Security – Vital Information all Payment Processors need to know
TLS Certificates on the Web – The Good, The Bad and The Ugly
2016 IRS Free e-File Audit & Honor Roll
Symantec’s View of the Current State of ECDSA on the Web
CA/Browser Forum—To effect positive changes to improve internet security
Update on the Work of the CA / Browser Forum
Extended Validation Builds Trust
CA Day 2014
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
New Ideas on CAA, CT and Public Key Pinning for a Safer Internet
Alternatives and Enhancements to CAs for a Secure Web
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements
State of the Web
Trust Service Providers: Self-Regulatory Processes
Certificates, Revocation and the new gTLD's Oh My!
CA Self Regulation
Nation-State Attacks On PKI

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Monthly Chronicles - July 2025
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx

New Window of Opportunity

  • 1. New Window of Opportunity: Certificate Transparency - A Certification Authority’s Perspective Ben Wilson, SVP DigiCert Ben_at_digicert_dot_com www.digicert.com +1 (801) 877-2100
  • 2. Introduction • Goals of Certificate Transparency: – Provide insight into issued SSL certificates – Provide better remediation services – Ensure CAs are aware of what they issue • DigiCert supports the concept of transparent certificate practices and certificate logging: – Voiced our support of transparency early on – Already accessing Google’s log server • Some outstanding areas require discussion prior to advocating industry-wide implementation ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 3. Issuance Flow ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 4. Transparency • Benefits – Fast detection = better mitigation – Greater visibility = better accountability for domain owners – Visible trust in operations = increased trust for CAs – Greater opportunity for discussion on certificates = improvement in Internet security • Security – Enables detection of problem and mis-issued certificates – Necessary for adequate remediation ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 5. Public Logging • Public logging was discussed previously in CA /B Forum – Action by a browser was needed to make it happen • Public log shines a light on CAs • Public log provides mitigation – All of the incidents could have been more quickly detected and remediated with CT • Public log helps researchers • Public log is detection in security – Baseline requirements is prevention – Revocation is remediation ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 6. Security Improvement • Raises awareness of practices – Allows broader observation of a CA’s practices – Allows domain owners to identify illegitimate use of domain names (Early Warning System) • Exposes weak points/players in ecosystem – Enables research to identify improvement areas • Enables trust decisions for domain owners – Self-regulating mechanism for the market ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 7. Other Benefits • Backward compatible • Driving towards implementation • Expands the existing system – SSL has a proven track record – Lots of institutional knowledge – Increasingly stringent standards • Avoids “unintended consequences” of new technology • Deployed by CAs and Browsers – Web site operator participation is not required ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 8. Implementation • Obtained REST JSON API from Google (URL reference) • Identified log servers – No new infrastructure • Updated our issuance code to communicate with log server • Created code to verify signed proof on response before embedding into certificate • Modified our certificate profile ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 9. Remaining Questions from CAs • Number of Proofs – Each proof increases certificate size – Increased certificate size hampers performance • Privacy, competitive business considerations • Level playing field requirement for all CAs • Exemptions for internal certificates • Log accessibility and resiliency of deployment ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 10. Log Server Considerations Model implementation provided by Google – Uses SQL light for log tree storage – Which CAs can add to a log? – What will be considered a trusted log? Security policy for trusted log operation is needed – Identify desired uptime and performance objectives – Scope broad enough to include entire system (e.g. mitigating disruption due to log compromises) – Perform risk assessment and adopt controls – Policy adoption process needs to be quick / efficient ©DigiCert, Inc. 2013. All Rights Reserved April 2013
  • 11. Conclusion DigiCert supports Certificate Transparency because it – Addresses vulnerabilities in the current trust model – Creates transparency and accountability that will lead to prevention and early detection of mis-issuances – Is based on existing technologies that are easily supported with industry coordination – Enhances existing self-regulating mechanisms by leveraging an existing, refined and time-tested CA trust- anchor system while avoiding the “unintended consequences” of new technology in unfamiliar space ©DigiCert, Inc. 2013. All Rights Reserved April 2013