PKI & CertificatesAlso called: "ct logs", "certificate monitoring"
CT logs create an append-only, cryptographically verified record of every certificate issued.
Benefits for security
- Detect rogue certificates issued for your domains.
- Monitor for typosquatting and phishing attempts.
- Verify CAs are following proper issuance procedures.
- Meet browser requirements (Chrome, Safari require CT logging).
How to use CT logs
- Monitor crt.sh or Censys for your domain names.
- Set up alerts for new certificate issuance.
- Validate certificates have SCTs (Signed Certificate Timestamps).
Related Tools
Explore More PKI & Certificates
View all termsPublic Key Infrastructure (PKI)
A framework of policies, processes, and technologies for managing digital certificates and public-key encryption.
Read more →X.509 Certificate
A digital certificate standard that binds a public key to an identity, enabling encrypted connections and authentication.
Read more →