This is a theorotical question.
As we know, the X.509 certificates are signed by the private key of the certification authority (CA).
The certificate information is hashed using a hash algorithm and this hash is encrypted by private key of CA and then the result is attached to the certificate. This is how a signed certificate is created.
I want to know what will happen or what steps have to be taken if private key of CA is compromised?
What does the Ca needs to do in this case?