For example certificate chain, issuer trustworthiness, known vulnerabilities.