¶ºÒõ¹Ý

National Cyber Security Awareness Month 10-07-2014

NCSAM Tip of the Week: Signing Your Code

¶ºÒõ¹Ý

It's week 2 of the (NCSAM). And, to help promote cyber security awareness, ¶ºÒõ¹Ý is posting a blog post once a week in coordination with that week's theme as well as daily security tips on social media. To see our daily tips, follow us on , , and .

Secure Development of IT Products

This week's theme for the NCSAM is "Secure development of IT products." And, while secure development is important, it may not matter to your end-users if the code is tampered with while it's on its way to them.

Let's look at a real life example. When you go shopping for milk, a red flag goes off in your head if the seal is broken. You probably wouldn't buy that milk carton, and you might even reconsider shopping at that grocery store again. Even if everything else about the carton and the milk inside seemed fine, chances are no one is going to buy it.

This is because that seal is the sign that the milk inside has not been touched since it left the facility where it was bottled. And, without it, your trust in that carton and even that brand may be called to question.

Just as with the seal on the carton, unsigned code is suspiciously viewed by end-users. Users are growing more and more suspicious of anything downloaded from the Internet, which isn't surprising considering the increase in phishing emails (6.8% from 2013) and other phishing attempts that prompt users to download an item or click on an attachment.

Benefits of Code Signing

Signing code with a Code Signing Certificate creates a digital signature to verify the identity of the original code developer. Developers can digitally sign their application with a Code Signing Certificate from a Certificate Authority (CA), showing the user that the code has not been tampered with by a malicious third party. If the code was corrupted or if the application has not been signed, the user will be bombarded by frightening warning messages when they try to open the application.

However, the benefits of code signing don’t end with avoiding warning messages. By signing your code you are not only safeguarding your customer’s information, but you are also safeguarding your reputation. If an end-user downloads your application and it infects their system with malware or spam they will lose trust in your application, doing permanent damage to your brand.

Extended Validation (EV) Code Signing

EV Code Signing Certificates require a more rigorous and thorough validation process and standard Code Signing Certificates. Because of this process, code that is signed with an EV certificate helps establish your reputation with Microsoft's SmartScreen Application Reputation filter. And, because of ¶ºÒõ¹Ý's partnership with Microsoft, applications that are signed using a ¶ºÒõ¹Ý EV Code Signing Certificate can immediately establish your reputation in Windows 8 and Internet Explorer 9 and 10.

How It Works

To obtain a Code Signing Certificate, a developer applies for the certificate from a CA. The CA verifies the developer’s identity and provides them with a Code Signing Certificate.

Once the developer has the certificate, they must also download a code signing engine. Using the code signing engine, the developer selects the code that they want to sign and signs it with their certificate token. Once signed, the code will contain a timestamp as well as the developer's (or company's) information so that users know where the code is from and that it hasn't been tampered with since it was signed.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

12-04-2024

How artificial intelligence is reshaping digital trust

12-18-2024

Announcing the new open-source DCV library from ¶ºÒõ¹Ý

How to spot a fraudulent website