Action Steps:
Monitor all outbound PKI cert traffic to DoD/DISA and volume spikes—especially on non-admin systems.
Dump & hash all current root/intermediate certs.
Verify your “trusted roots” against air-gapped, known-good images.
Don’t trust “automated recovery” if you notice PKI/OCSP anomalies.
We are witnessing the weaponization of certificate trust infrastructure against military/civilian defense.
#infosec #DoD #PKI #cybersecurity #zerotrust #supplychain #nationalsecurity