Certificate Transparency (CT)
The Importance of CT
Certificate Transparency was created in response to CA compromises where attackers obtained fraudulent certificates for high-profile domains like google.com. Before CT, there was no reliable way for a domain owner to know if a rogue certificate had been issued for their domain.
With CT, every publicly trusted certificate must be logged. Domain owners can monitor these logs to detect unauthorized certificates quickly. Google Chrome requires CT compliance for all new certificates - a certificate without CT log entries will cause a browser warning. This means even a compromised CA cannot issue a certificate that goes undetected.
For website operators, CT logs are a free security monitoring tool. Services like crt.sh allow you to search CT logs for all certificates ever issued for your domain. This helps detect subdomain takeover attempts, phishing sites using your brand, or accidental certificate misissuance by your CA.
Testing Your Configuration
Search CT logs at crt.sh to see all certificates issued for your domain. An SSL checker will also verify that your certificate has valid Signed Certificate Timestamps (SCTs) proving it was logged. Regular CT monitoring helps you detect unauthorized certificates early.
Check SSL CertificateCase Study
Certificate Transparency logs detected the 2017 Symantec misissuance scandal, where Symantec CAs had issued over 30,000 certificates without proper validation. The CT log evidence was key to Google's decision to progressively distrust all Symantec-issued certificates in Chrome, ultimately forcing Symantec to sell its CA business to DigiCert.