CA/Browser Forum
Home » All CA/Browser Forum Posts » 2023-11-16 Minutes of the Code Signing Certificate Working Group

2023-11-16 Minutes of the Code Signing Certificate Working Group

Attendees

Andrea Holland – (VikingCloud), Ben Dewberry – (Keyfactor), Brianca Martin – (Amazon), Bruce Morton – (Entrust), Corey Bonnell – (DigiCert), Dimitris Zacharopoulos – (HARICA), Eva Vansteenberge – (GlobalSign), Ian McMillan – (Microsoft), Inaba Atsushi – (GlobalSign), Inigo Barreira – (Sectigo), Janet Hines – (VikingCloud), Martijn Katerbarg – (Sectigo), Mohit Kumar – (GlobalSign), Richard Kisley – (IBM), Roberto Quionones – (Intel), Rollin Yu – (TrustAsia Technologies Inc), Scott Rea – (eMudhra), Tim Crawford – (CPA Canada/WebTrust)

Minutes

Assign Minute taker

  • Martijn Katerbarg

Roll call

  • Read by Bruce

Antitrust Compliance Statement

  • Read by Bruce

Approval of prior meeting minutes

  • Minutes of the November 2nd meeting were approved.

Ballot CSC-21 (Signing Service) Status

  • Ian discussed with Tim that the Cloud Security Alliance (CSA) STAR CCM Certification with the audit requirements (“Level 1” or “Level 2”) could be an alternative to the proposed audit requirements.
  • Bruce suggested that this could be a big change to the ballot, so how do we proceed.
  • Dimitris stated that the discussion period can last for 90-days, so we have time to update and start a new discussion period. Bruce and Ian will work on an update to the ballot.

High Risk Ballot

  • It’s agreed that with CSC-21 being put on hold, the High Risk ballot can proceed and take priority. Bruce with work with Corey to add the proposal to GitHub and start a ballot.

Remove EV Guideline References Ballot

  • Dimitris offered to prepare a non-normative ballot to remove all EV Guideline references from the CSBRs. A follow-up normative ballot will be considered to change/update the EV requirements.

CSCWG Charter Update Ballot

  • Ballot text is final. Dimitris has already endorsed. Bruce offered to endorse during the call.

Other business

  • During the November 30 meeting, a presentation will be given regarding the Key Attestation RFC.

Next meeting

  • 2023-11-30
Latest releases
Server Certificate Requirements
SC095v3: Clean-up 2025 - Apr 2, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.14 - Ballot SMC016 - May 5, 2026

This ballot maintains consistency between the S/MIME Baseline Requirements and the TLS Baseline Requirements with changes introduced by Ballots SC096 and SC097. Specifically, this ballot: Creates a carve-out of the logging requirements for DNSSEC specifically, stating these are not in scope. For audit purposes, change management logging is able to confirm if the appropriate controls are in effect or not. Sunsets all remaining use of SHA-1 signatures in Certificates and CRLs. It is noted that most uses of SHA-1 signatures are already deprecated by SC097. With this ballot, all unexpired Subordinate CA Certificates issuing S/MIME containing the SHA-1 signature algorithm must be revoked. This proposal does not prohibit the use of SHA-1 to generate issuerKeyHash or issuerNameHash values as currently required by RFC 5019. Includes minor formatting corrections.

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).