...
Certificate Transparency (CT) log service
Used , used by Certification Authorities (CA:s) to log issued certs in.
Used by web browsers to verify that certificates are publicly logged.
Used by browser vendors for proof of certificate mis-issuance.
...
CT logs are part of the web security infrastructure on the internet, ultimately strengthening trust in domain certificates by catching "lying CA:s".
UseCases/UserStories: ct_user_stories.txt
Contacts
All operations, business development and stakeholders contacts
...
Technology infrastructure
- In-house developed OSS "catlfish"
View file name catlfish-system-2.pdf height 250
Add list and description of products and resources used to deliver main functionalities of the service. Add service technical architecture - i.e. its good to have a conceptual architectural diagram and topology diagram.
Supporting infrastructure
...
View file name urd-topology.pdf height 250
Supporting infrastructure
- Systems and service operations framework for deployment and orchestration
- Monitoring system for checking the health of systems and services and generating alarms
- Hardware Security Module (HSM) infrastructure forkeeping sensitive keys off of general purpose computer
Cost Benefit Analysis
Provide URL to last valid CBA
CBA draft documents can be found as attachements in
(restricted access)