Organization admits it βlostβ access to its signing key; an expert says this shows the need for object management by CISOs.

Kali Linux administrators who havenβt manually updated the signing key for the operating systemβs repository are going to find that they canβt get updates.
This comes after the overseers of the open source distribution aimed at penetration testers and other infosec pros admitted this week that they lost access to the signing key for the Kali repository, and had to roll out a new one.
βThis is entirely our fault,β Kali acknowledged in a blog.
In fact, the incident happened over a week ago, and Kali had to freeze the update repository on April 18, when a new signing key was created. Thatβs why no one has been impacted yet. However, this week the repository will be available, and those who donβt have the new signing key will find they canβt do automatic updates.
Admins need to download and install the new key manually, and then verify that the checksum of the file matches one created by Kali. If some admins prefer to rebuild their Kali system from scratch, Kali has updated all of its images to contain the new keyring.
Kali said the old key wasnβt compromised. No reply to a request for comment had been received by our deadline.
This isnβt the first time Kali has had a signing key problem, noted Robert Beggs, head of Canadian penetration testing and incident response provider DigitalDefence. In 2018, a key was allowed to expire.
βItβs a minor blip,β he said in an interview, βthatβs easy to overcomeβ by typing in a line of code, as detailed in the Kali blog.
Loss of signing keys is βvery uncommonβ among application vendors, he said, βbecause this is an enterprise level project where someone should be managing a group of people together. The fact that it happened twice [at Kali] suggests they just donβt have central management. It [loss of the key] doesnβt make the product worse, doesnβt denigrate the excellent work theyβre putting in. It just says that the central management piece is absent.β
The only people who will be inconvenienced are the admins who donβt understand the error message they get when trying to update the distribution, and havenβt seen the news that the key is out of date, Beggs said. But he believes most Kali admins already know about the issue and the solution.
The lesson to CISOs whose organizations use anything that has to be renewed, from a key to a software license, is to treat it as an object that has to be maintained, Beggs said.
βYou also have to build in continuity,β he added. βThe biggest issue weβve seen in the past isnβt that a person failed to renew, itβs that a person that knew about the key or the license moved on, or to a new position. Enterprises frequently fail to maintain continuity.
βStop thinking about this as a single person responsibility. Itβs an enterprise responsibility,β he advised. βDe-personalize it. Make sure thereβs a continuity of [object] management so that if someone moves on, has an accident or forgets, there are enterprise controls in place that make sure the [management] process continues.β