Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

CT logs are part of the web security infrastructure on the internet, ultimately strengthening trust in domain certificates by catching "lying CA:s".


UseCases/UserStories: ct_user_stories.txt

Contacts

All operations, business development and stakeholders contacts

...

  • Systems and service operations framework for deployment and orchestration
  • Monitoring system for checking the health of systems and services and generating alarms
  • Hardware Security Module (HSM) infrastructure forkeeping sensitive keys off of general purpose computer

...

Cost Benefit Analysis

Provide URL to last valid CBA

CBA draft documents can be found as attachements in

CT CBAs

 (restricted access)