This page contains service description outlining how and where service should be used, targeted users, service delivery model and service elements and topology. RESPONSIBLE: Information provided in this page is initially populated by the development team (during the transition phase), and revised based on the need or in a yearly service check by Certificate Transparency (CT) Service Manager, with exception of CBA which remains the responsibility of business development team. |
Service description
Certificate Transparency (CT) log service
Used by Certification Authorities (CA:s) to log issued certs in.
Used by web browsers to verify that certificates are publicly logged.
Used by browser vendors for proof of certificate mis-issuance.
Users
CT logs are part of the web security infrastructure on the internet, ultimately strengthening trust in domain certificates by catching "lying CA:s".
UseCases/UserStories: ct_user_stories.txt
Contacts
All operations, business development and stakeholders contacts
Service Manager | Deputy Service Manager | L1 support | L2 support | L3 support |
---|---|---|---|---|
Service delivery model
CT logs are accessed over HTTP on the public internet.
Service Elements
Service Elements, with brief description and links to products, resource instances and software stack of the service, indicating the software components types - if they are internally (in-house) developed, OSS or commercial off-the-shelf software. Service elements can be grouped in two following categories:
Technology infrastructure
- In-house developed OSS "catlfish"
Supporting infrastructure
- Systems and service operations framework for deployment and orchestration
- Monitoring system for checking the health of systems and services and generating alarms
- Hardware Security Module (HSM) infrastructure for keeping sensitive keys off of general purpose computer
Cost Benefit Analysis
Provide URL to last valid CBA
CBA draft documents can be found as attachements in
(restricted access)