Podcast
Root Causes 349: 2023 Lookback - Overall Trends


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
December 18, 2023
We look back at PKI in 2023. Trends include artificial intelligence, enterprise crypto agility, the fall of OCSP, PKI everywhere, the weakness of passwords, and government versus the internet. We also look at last year's predictions and compare them to the year's events.
Podcast Transcript
Lightly edited for flow and brevity.
Crypto agility for public cloud increases in visibility. I would say, yeah, that happened.
Public CA independence increases in importance. I would say, yeah, that happened.
Consume adoption of WebAuthn begins. Definitely happened. For sure. That one was big. There were a couple big announcements in that regard.
And then, post quantum cryptography shows up on the enterprise’s radar. And this last one I want to unpack because not even 2023 but the latter half of 2023 all of the sudden this PQC story just opened up. Like you and I have been talking about this for four years and suddenly in the last four months, it’s all over the place.
Now, what’s the big thing we missed?
So, I’ve got a list of eight bullets here and the first one is, it’s all about AI, right? You and I talked after RSA. Right? We did our post-RSA Conference wrap-up which we always do, and I commented on the fact that there was almost no mention of artificial intelligence on the show floor at RSA. It wasn’t in the programs. It wasn’t in the speeches. It wasn’t in the booths. And at the time, I speculated that that’s because RSA is a long lead event. You know. You are putting in your calls for presentations almost a year ahead of the event. Like 10 months ahead of the event. You are putting together your booth a solid six months ahead of the event. Like AI was just moving too fast for the industry to keep up with it at that event. I am predicting that in 2024 at RSAC, which I plan on going to, that it will be everywhere.
We talked about deepfakes. Right? Deepfakes are indeed part of the toolkit for spear phishing and social engineering in a real basic way and in a way that it wasn’t a year ago. Like in one year it’s just normal.
Ok. New ones.
Enterprises begin to take crypto agility seriously. I’m gonna contend – and note the word begin – I think many, many, many enterprises still don’t take crypto agility seriously, but I think that a year ago or two almost nobody did. Unless you were a major global bank or the Pentagon, you weren’t taking crypto agility seriously. And now, we are seeing many more just large companies that are well-resourced with a lot of stakes where everything is purely digital and if it’s not working right, their whole business is gonna shut down saying we’ve gotta look at automation, we’ve gotta be able to change out our algorithms, we understand that we can’t just sit on something for 40 years anymore and I feel like there was a lot of progress in that regard in 2023 and I think that’s healthy.
A lot of people are still at that basic level of getting out of the spreadsheet type of maintenance of their certificates. You’ve gotta get out of that mode. You’ve gotta get into automating. You’ve gotta have visibility. You gotta be discovering things that you don’t know you have on a continuous basis. Those are the things that you - - you have to have those things before you can even begin to think about crypto agility.
Alright. Next one on the list – the move away from OCSP.
But, hey, it has a lot to do with shortening certificate lifespans which is from the previous topic we covered.
And so what have we seen in the last year? We’ve seen movement away from OCSP. Not just thought but actual movement. We have the CA/Browser Forum ballot that makes OCSP optional. We have a telegraphed intention from the Chromium Moving Forward Together page to say that they would like to get away from OCSP. We’ve got statements from other major root programs and browsers saying they would like to get away from OCSP. So, the tide has turned against OCSP in a pretty big way to the point where I think this is a fait accompli. I think OCSP is a dead man walking and it’s just a matter of time.
And OCSP as a technology around revocation for checking is one of those things where if you really put it under scrutiny, it starts to fall apart. As you said, the only way to solve the revocation problem really and truly move away from OCSP completely is shortened certificate lifespans.
Now, that won’t be a done deal in 2024 but we are gonna see definite progress in 2024 and I think in the next few years, we are gonna see OCSP all but disappear.
What I’m calling PKI everywhere. Now this isn’t just a 2023 thing, but this is a trend that we’ve seen in recent years and it’s continuing and it’s just basically the idea that there’s really nothing digital occurring at all anywhere that shouldn’t be governed by PKI. And we’ve seen just real ubiquitous coverage of that. If you look at a large modern architecture enterprise, they don’t have internal servers that don’t have certs on them. They don’t do that. They don’t have data in motion even inside of their environment that isn’t encrypted. They don’t do that. They don’t have data at rest that isn’t encrypted. They don’t do that. Right? Like, that’s what a modern architecture looks like. And we see it in all kinds of aspects, and I think the headline in this regard for 2023 was really WebAuthn. FIDO2. Right? Where the - - and what Apple called a passkey and I forget – there’s a name for it on Android. I don’t remember what it is. But the idea is that this concept of PKI-based authentication and identity really on its way to being truly ubiquitous.
And I gotta give credit to the folks at FIDO who have been chugging away for years and finally things culminated into WebAuthn because there’s so many standards. There’s a handful of standards that really developed into this and then the adoption by the big tech companies is then what put it over the top. Because I’ve now used Apple’s passkeys. I’ve now used Google’s version as well and I’ll tell you what – we’ve always said, Tim, once you’ve implemented better door locks, better authentication, stronger authentication, it also makes the user experience better and sure enough, it did. Bravo, guys. You did a great job.
Alright. Ready for the last one?
You know, what did we see? We’ve seen governments like Australia and Canada trying to control or somehow regulate what sites you visit or how people link. We’ve seen Canada try to control and regulate how you publish content and then, of course, there are more nefarious things in other governments where they are trying to actually do things like man-in-the middle of the cryptography and this sort of thing just goes on and on and on with no end in sight. It’s been a theme that goes all the way to the birth of cryptography and the birth of the internet, and it has never let up and I think 20 years from now if you and I are still doing this podcast, we will still be talking about this.
So that’s it. That’s what I thought were the main themes of the last year. Do you want to add anything, Jay?

