[TheRecord] Dutch government to stop issuing TLS certs because of ever-complicated standards

The Dutch government, the last EU country that is still running its own certificate authority (CA), announced plans last week to stop issuing new TLS certificates starting December 2021.

The Dutch Ministry of the Interior and Kingdom Relations, which is in charge of the PKIoverheid program, cited three reasons for discontinuing the program:

The ever-increasing technical requirements imposed by browser makers for running a compliant TLS Certificate Authority (CA).Security incidents the program suffered in 2019 and 2020, which forced its staff to replace a large number of certificates for its customers.The fact that the Netherlands is the last country in the EU to run its own CA, with all other governments offloading the process to the private sector.

At a technical level, Dutch officials said they do not plan to renew a root certificate for the PKIoverheid CA program once it expires next year, on December 6, 2022.

Since TLS certificates have a lifespan of roughly one year, PKIoverheid will issue its last TLS certs in December this year to synchronize with the root cert expiration.

Dutch officials said that while the government was shutting down the TLS certificate issuance section of PKIoverheid, the program will continue to issue other types of digital certificates, including those for signing official government software.

The section that will be shut down is the one that provides TLS certificates to secure official Dutch government sites and websites and domains for critical sector entities, such as transport, energy, or healthcare providers.

The government expects government agencies and other organizations to obtain TLS certificates from private sector CAs, as is the case in most European countries today.

The post Dutch government to stop issuing TLS certs because of ever-complicated standards appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[HackerNews] Hackers Using Squirrelwaffle Loader to Deploy Qakbot and Cobalt Strike

All posts, HackerNews

A new spam email campaign has emerged as a conduit for a previously undocumented malware loader that enables the attackers to gain an initial foothold into enterprise networks and drop malicious payloads on compromised systems. “These infections are also used to facilitate the delivery of additional malware such as Qakbot and Cobalt Strike, two of […]

Read More

[SecurityWeek] Medical Technology Company Olympus Discloses Cyberattack

All posts, Security Week

Japanese medical technology company Olympus this week revealed that its operations in the Americas were affected by a cyberattack. Detected on October 10, the attack forced the company to shut down some of its systems, but Olympus says that it is already working on restoring them back to normal. read more Source: Read More (SecurityWeek […]

Read More

Daily NCSC-FI news followup 2021-04-04

Malware attack is preventing car inspections in eight US states www.bleepingcomputer.com/news/security/malware-attack-is-preventing-car-inspections-in-eight-us-states/ A malware cyberattack on emissions testing company Applus Technologies is preventing vehicle inspections in eight states, including Connecticut, Georgia, Idaho, Illinois, Massachusetts, Utah, and Wisconsin. Applus Technologies cannot provide a time frame for when they will restore service as State governments require them to […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.