News

The most important developments of recent years at a glance

Analysis and brief updates on trends, standards, and incidents involving Public Key Infrastructure (PKI), Certificate Lifecycle Management (CLM), certificates, and encryption.

Search & Filters

Years
Technical terms

Inventory-first: complete certificate inventories become a core requirement

2025-12-01
Short-lived certificates make blind spots costly. Best practice: a central inventory built from active discovery (network scans, logs, CT), CMDB integration, and an ownership model so every identity has a responsible service owner.

Shorter validation reuse periods require faster re-validation

2025-10-01
As reuse periods for domain/IP validation shrink, re-validations become more frequent. Consequence: automated domain-proof processes, robust DNS API workflows, and reporting that identifies re-validation backlogs early.

CT-Modernisierung: Let’s Encrypt beendet RFC‑6962‑Logs

2025-08-14
Let’s Encrypt announces the end-of-life of its Certificate Transparency logs under RFC 6962 and points to the modernized CT generation. For operators, this means reviewing SCT sources, updating monitoring/alerting, and ensuring CT compliance remains consistent across the entire chain (precert, SCTs, log list).

PQC pilot projects start in production-like TLS setups

2025-07-01
Organizations are beginning to pilot hybrid KEMs and PQ signatures in test zones. Focus areas: interoperability tests, performance budgets, certificate sizes, MTU risks, and HSM support.

Certificate lifetimes: 47-day roadmap becomes visible in policies

2025-05-16
After the CA/B Forum decision (Ballot SC081v3), concrete milestone dates are becoming visible in requirements and being planned as binding in internal policies. For CLM roadmaps, this means adjusting renewal SLOs, rethinking change windows, and handling failure modes (e.g., DNS disruptions) cleanly.

CA/B Forum adopts phased plan down to 47-day certificate validity

2025-04-11
Ballot SC081v3 introduces a binding roadmap: the maximum validity of publicly trusted TLS certificates is reduced step by step (including 200/100 days) down to 47 days. Technical consequence: CLM must be fully automated (inventory, issuance, renewal, rollback), including DNS automation for ACME DNS-01 and reliable telemetry for notAfter, SAN drift, and key parameters.

CA/B Forum publishes updated Baseline Requirements (winter cleanup)

2025-01-23
The BR revision bundles clarifications, errata, and new compliance timelines. For operators, transition periods are especially relevant: validation reuse periods, permitted methods, and alignment with internal policy sets.

NIST publishes final PQC FIPS (Kyber/Dilithium/SPHINCS+)

2024-08-13
NIST publishes the first finalized post-quantum standards (FIPS 203/204/205). For PKI programs, this marks the start of concrete migration planning: crypto inventory, hybrid certificate/handshake tests, MTU/handshake budgeting, and compatibility checks (TLS terminators, HSM firmware, Java/.NET stacks).

ACME becomes standard in enterprise PKIs

2024-07-15
ACME (RFC 8555) is established in many internal PKIs as a self-service interface. Operationally critical: clear challenge policies (HTTP-01 vs. DNS-01), rate limits, account-key governance, and a renewal window that absorbs disruptions caused by deployments and maintenance windows.

Crypto agility is explicitly required in procurement

2024-05-14
More and more RFPs require demonstrable crypto agility: changing algorithms without rebuilding the platform. Technically, this means documenting abstract crypto providers, HSM roadmaps, dual-stack capabilities, and migration paths.

CAA rechecking bugs show: compliance checks are production logic

2024-02-29
Incidents around CAA rechecking show that policy checks are not optional. For internal CAs/CLM, this means versioning validation logic, maintaining test suites, and keeping rollbacks ready for issuance pipelines.

Chain hygiene: SHA-1 in intermediates becomes a blocker

2023-12-01
Even if end-entity certificates are modern, legacy intermediates or cross-signs can become a problem. Operationally: inventory the full chain, harmonize trust stores, and document cross-sign strategies.

S/MIME renaissance driven by compliance programs

2023-10-10
Email signing and encryption via S/MIME are becoming more relevant. For operations, short lifetimes, automated enrollment processes (e.g., via MDM), and revocation/key-recovery processes are crucial so role changes and offboarding can be handled cleanly.

CT monitoring becomes a mandatory discipline

2023-06-01
CT watchlists for your own domains, allowed-issuer lists, and alerting for deviations (SAN patterns, unknown issuers) are a fixed part of detection pipelines in many organizations. Goal: detect mis-issuance within hours, not only during an incident.

ACME adoption for device identities increases

2023-04-18
In IoT/OT environments, automated initial issuance and rotation are becoming more important. Critical: secure bootstrap identities, hardware-backed keys (TPM/SE/HSM), and protocol selection (EST/SCEP/ACME) appropriate for the device type.

mTLS scales in service meshes: identities become workload-first

2022-11-08
With service mesh and zero-trust network segmentation, the number of machine identities grows massively. This remains stable only with automatic issuance/rotation, consistent SPIFFE IDs, and SLO-based monitoring (handshake errors, certificate age, issuer drift).

NIST selects first PQC algorithms for standardization

2022-07-05
NIST selects Kyber (KEM) and Dilithium/Falcon/SPHINCS+ (signatures) as the basis for standardization. This raises practical questions: which use cases need PQ resilience first, how large can keys/signatures become, and which protocols/appliances are PQ-capable?

Short-lived certificates for workloads gain traction

2022-02-01
Many platforms are moving internally to hour/day certificates. This requires highly available issuance services, local caching proxies, clear grace periods, and telemetry that detects expiry risk early.

Let’s Encrypt: TLS-ALPN-01 incident leads to revocations

2022-01-26
Let’s Encrypt reports a malfunction in the tls-alpn-01 validation method and classifies affected certificates as mis-issued. Practical lesson: challenge methods must be monitored; fallback strategies (DNS-01/HTTP-01) and fast re-issuance pipelines prevent downtime.

Automation becomes an audit requirement

2021-12-15
In regulated environments, CLM is increasingly treated as a controlled process: policies as code, four-eyes approvals for CA changes, traceable Key Usage/Extended Key Usage policies, and audit-proof logs for issuance and revocation.

RFC 9162 (CTv2) is published – CT continues to evolve

2021-12-10
Certificate Transparency v2 (RFC 9162) modernizes CT (including new structures and Ed25519 support). Even though CTv1 still dominates in the industry, preparation is worthwhile: log compatibility, parsers, and monitoring pipelines should be planned with v2 capability.

SCT handling becomes operationally visible (chain rollouts, CDN, LB)

2021-09-15
As CT enforcement increases, incorrectly distributed SCTs or log outages lead to production issues. Best practice: diversify SCT sources, monitor CT health, and design rollouts so the precert/SCT path remains stable.

ACME DNS-01 becomes the de facto standard for wildcards

2021-05-01
In practice, DNS-01 becomes the most robust challenge type for wildcards and headless services. Critical factors are API-capable DNS providers, least-privilege credentials, and a clean separation of zone ownership and issuance authorization.

398-day limit for WebPKI certificates takes effect

2020-09-01
Browser/root policies set the maximum lifetime of publicly trusted TLS server certificates to 398 days. This shifts renewals into routine operations: renewal windows, expiry forecasting, and auto-renewal become availability controls.

Let’s Encrypt announces mass revocation due to a CAA rechecking bug

2020-03-03
A software bug forces Let’s Encrypt into a large-scale reissue/revocation action. Lesson for operators: CAA records are policy controls, but operationally safe only if automation can handle renewal bursts and short-notice reissues.

Apple announces 398-day cap in root policy

2020-02-26
Apple publicly announces the planned limit on certificate validity. For many companies, this is the trigger to prioritize CLM automation and convert maintenance models (annual windows) to continuous renewal.

EV Guidelines: org identifier extension becomes mandatory

2020-01-15
The EV Guidelines require the consistent representation of organizational identifiers. This reduces ambiguity in organizational data, but requires clean data sources, validation processes, and controlled attribute maintenance in RA workflows.

RFC 8659 published: CAA is updated and clarified

2019-11-19
RFC 8659 replaces RFC 6844 and clarifies, among other things, the processing and semantics of CAA records. For operators, this means reviewing CAA policy, evaluating iodef workflows (reporting), and testing issuance pipelines for correct interpretation.

RFC 8555 published: ACME becomes Standards Track

2019-03-01
The publication of RFC 8555 establishes ACME as an interoperable standard for automated certificate issuance. For enterprise PKI, this means clean account-key management, challenge hardening, and centralized visibility into issuance rates.

TLS 1.3 als RFC 8446 publiziert

2018-08-10
TLS 1.3 reduces attack surface (including no static RSA key exchange), speeds up handshakes, and enforces modern cipher suites. On the PKI side, requirements increase for clean chains, SAN hygiene, and compatible middleboxes.

CA/B Forum enforces 825-day cap (Ballot 193)

2018-03-01
Ballot 193 reduces the maximum lifetime of publicly trusted TLS certificates to 825 days. This is the first major step away from multi-year certificates and toward continuous renewal.

CAA checking becomes effective in the Baseline Requirements

2017-09-08
From this date onward, publicly trusted CAs must check and honor CAA records. For domain owners, this becomes an additional protection control, including monitoring for CAA drift and documented exceptions.

CA/B Forum Ballot 187 adopted: CAA checking becomes mandatory

2017-03-08
Ballot 187 makes CAA checking mandatory. This makes DNS policy (issue/issuewild/iodef) a standard control against mis-issuance—provided DNS change management and TTL strategy are operationally sound.

Chrome clarifies Symantec distrust – migration pressure increases

2017-03-07
Google publishes details on the required replacement of Symantec legacy certificates. Operationally relevant: CA migration runbooks, chain rollouts on load balancers/appliances, and CT monitoring to control the migration.

Mozilla initiates the end of SHA-1 on the web

2017-02-23
Mozilla outlines the phase-out strategy for SHA-1 certificates. For companies, this is the momentum to remove SHA-1 completely from internal PKIs and especially from TLS server certificates, and to enforce hash policies centrally.

CA incidents (WoSign/StartCom) accelerate governance controls

2016-10-21
Root-store decisions around WoSign/StartCom make it clear that CA compliance is an operational risk. Consequence: allowed-issuer lists, CT alerts, and fast re-issuance pipelines become standard controls.

Let’s Encrypt leaves beta and launches broadly

2016-04-12
With production launch, automated certificate issuance scales massively. For operators, ACME automation (including internal use) becomes the reference pattern, including DNS workflows, rate limits, and a central certificate inventory.

DROWN: SSLv2 on adjacent host compromises TLS host

2016-03-01
DROWN demonstrates the danger of key reuse across protocols/hosts. Operationally, this means: disable SSLv2 everywhere, avoid key reuse between services, and always plan for patch + rekey + reissue in incident response.

Let’s Encrypt tritt in Public Beta ein

2015-12-03
The public beta opens free, automated TLS certificates to everyone. The effect: HTTPS adoption increases, while short lifetimes and automated renewal become the norm on the web.

Logjam: weak DH parameters and DHE_EXPORT as a risk

2015-05-20
Logjam makes it clear that not only protocol versions but also parameter quality matters. Measures: disable DHE_EXPORT, enforce strong (preferably ECDHE) key exchanges, and keep central TLS profiles consistent across all termination points.

FREAK: export cipher downgrade becomes practically exploitable

2015-03-03
The FREAK attack forces the disabling of EXPORT cipher suites and a review of TLS profiles on load balancers, proxies, and legacy stacks. Audit artifact: a documented cipher-baseline profile for each zone/use case.

POODLE shows the risks of fallbacks to SSLv3

2014-10-14
The POODLE attack underscores that protocol downgrades are security-critical. Consequence: disable SSLv3, harden TLS versions/cipher suites, and correctly configure fallback mechanisms (e.g., TLS_FALLBACK_SCSV).

CA/browser ecosystem accelerates SHA-1 replacement

2014-09-24
Browser vendors publish concrete degradation paths for SHA-1. Important for PKI programs: enforce hash policies centrally, identify legacy devices, and time-limit exceptions—including documented risk acceptance.

Mozilla announces SHA-1 warnings

2014-09-23
Mozilla communicates concrete steps to visibly degrade SHA-1 in the browser. For PKI teams, this means SHA-1 cleanup, hash policies, and signature-algorithm telemetry in platforms (LB, proxy, Java/.NET).

Heartbleed: key material can be read from memory

2014-04-07
The OpenSSL vulnerability forces a global patch-and-rekey pattern: patching is not enough—private keys must be treated as potentially compromised and certificates reissued. CLM automation determines whether this can be accomplished in days or weeks.

Lucky13: timing side channel against CBC in TLS

2013-12-04
Lucky13 shows how difficult constant-time behavior is in TLS-CBC implementations. Operational consequence: prefer AEAD ciphers (GCM/ChaCha20-Poly1305) and actively retire outdated CBC profiles.

RFC 6962 (Certificate Transparency) published

2013-06-01
CT describes a log-based proof model against hidden mis-issuance. In the long term, CT becomes a central governance control for WebPKI certificates, including domain monitoring and issuer control.

RFC 6797 published: HSTS becomes standard

2012-11-19
With HSTS (HTTP Strict Transport Security), HTTPS becomes a server policy decision: browsers may no longer downgrade to HTTP. For operators, preload strategies, subdomain policies, and rollback scenarios are central to avoid misconfigurations without self-DoS.

The ACME idea emerges from the need for automation

2012-10-01
Early ACME development addresses the scaling problem of manual certificate processes. The technical direction—API-based issuance and automated renewal—still shapes enterprise CLM programs today.

Mozilla removes DigiNotar from the trust store

2011-09-02
After the DigiNotar incident, Mozilla takes action and removes trust. The lesson: CA compromise is a single point of failure in the trust model—therefore inventory, fast re-issuance capability, and CT monitoring are essential.