November 1, 2016 By Larry Loeb 2 min read

First organized in 2005, The CA/Browser Forum is a voluntary group of certification authorities (CAs), vendors of internet browser software and suppliers of other applications that use X.509 v.3 digital certificates for SSL/TLS and code signing. In other words, it’s an industry group focused on certificates.

The Forum was a logical place for Ryan Sleevi of Google to announce that as of October 2017, the Chrome browser would implement Certificate Transparency (CT) as a mandatory feature.

What Is Certificate Transparency?

CT is an open-source framework designed by Google. It is used for monitoring and auditing the domain certificates sites use to establish authenticity with browsers. First proposed in 2013, Certificate Transparency is now an Internet Engineering Task Force (IETF) open standard, Threatpost reported.

Google thinks the use of CT will aid the trusted online community. “The use of Certificate Transparency has profoundly altered how browsers, site owners and relying parties are able to detect and respond to misissuance and, importantly, gives new tools to mitigate the damage caused when a CA no longer complies with community expectations and browser programs,” Sleevi said on the forum.

Push Toward Mass Adoption

At its heart, CT is a way to reign in CAs that go off the tracks. This happens frequently: Within the past year, Symantec publicly issued certificates that were supposedly for internal use only and a major Chinese CA was also caught issuing untrustworthy certificates to unknown sites. Malware actors could use these certificates in inappropriate and untrustworthy ways.

Google knows it can’t push the entire population toward standardization and mass adoption of CT all by itself, but it can impose the technology on Chrome users. Since Chrome has an overall market share near 60 percent, just doing that will have a great effect.

Google invited security researchers to come forward with any issues related to CT in the next three months to allow time for solutions to be implemented.

Resistance to CT

There may be deeper problems regarding CT. Bruce Morton, director of certificate services with EnTrust, told Threatpost that some have expressed hesitation about registering all external and internal domain names in one publicly accessible repository. He argued that many companies would rather keep this information private.

It remains to be seen if Google can get the industry to rally around CT as a standard way of doing business.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today