We would like to get to the point of having separate CA hierarchies for separate purposes, e.g. TLS (Web PKI), TLS EV, and S/MIME.
Therefore, we should add the following requirement to Mozilla's root store policy with a future effective date:
If a CA is trusted for purpose (e.g. TLS or TLS EV), then that certificate and all of its subordinate CAs should be audited against the criteria relevant for that purpose.