November 1, 2016 By Larry Loeb 2 min read

First organized in 2005, The CA/Browser Forum is a voluntary group of certification authorities (CAs), vendors of internet browser software and suppliers of other applications that use X.509 v.3 digital certificates for SSL/TLS and code signing. In other words, it’s an industry group focused on certificates.

The Forum was a logical place for Ryan Sleevi of Google to announce that as of October 2017, the Chrome browser would implement Certificate Transparency (CT) as a mandatory feature.

What Is Certificate Transparency?

CT is an open-source framework designed by Google. It is used for monitoring and auditing the domain certificates sites use to establish authenticity with browsers. First proposed in 2013, Certificate Transparency is now an Internet Engineering Task Force (IETF) open standard, Threatpost reported.

Google thinks the use of CT will aid the trusted online community. “The use of Certificate Transparency has profoundly altered how browsers, site owners and relying parties are able to detect and respond to misissuance and, importantly, gives new tools to mitigate the damage caused when a CA no longer complies with community expectations and browser programs,” Sleevi said on the forum.

Push Toward Mass Adoption

At its heart, CT is a way to reign in CAs that go off the tracks. This happens frequently: Within the past year, Symantec publicly issued certificates that were supposedly for internal use only and a major Chinese CA was also caught issuing untrustworthy certificates to unknown sites. Malware actors could use these certificates in inappropriate and untrustworthy ways.

Google knows it can’t push the entire population toward standardization and mass adoption of CT all by itself, but it can impose the technology on Chrome users. Since Chrome has an overall market share near 60 percent, just doing that will have a great effect.

Google invited security researchers to come forward with any issues related to CT in the next three months to allow time for solutions to be implemented.

Resistance to CT

There may be deeper problems regarding CT. Bruce Morton, director of certificate services with EnTrust, told Threatpost that some have expressed hesitation about registering all external and internal domain names in one publicly accessible repository. He argued that many companies would rather keep this information private.

It remains to be seen if Google can get the industry to rally around CT as a standard way of doing business.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today