Certificate Transparency and CT Logs
February 01, 2026
•
1 min read
•
13 views
Table of Contents
CT helps detect misissued or malicious certificates.
How CT Works
- CAs submit to public logs
- Logs are append-only
- Monitors watch for certs
- Browsers require CTMonitoring Benefits
- Detect unauthorized certs
- Find shadow IT domains
- Identify phishing sites
- Audit CA complianceMonitoring Tools
- crt.sh
- Facebook Certificate Transparency
- Cert Spotter
- SSLMate
- Google Transparency Report
Related Posts
Shadow IT Discovery and Governance
Find and manage unauthorized cloud services.
Incident Classification and Prioritization
Properly categorize and prioritize security incidents.
Security Architecture Review Process
Evaluate security early in system design.
Comments (0)
No comments yet. Be the first to comment!