
Let’s first start with stating the most important part of this article: there is nothing wrong with Certificate Transparency (CT). CT enables you to “…detect SSL certificates that have been mistakenly issued by a certificate authority or maliciously acquired from an otherwise unimpeachable certificate authority. It also makes it possible to identify certificate authorities that have gone rogue and are maliciously issuing certificates.” (Source: certificate-transparency.org/).

Why is this a problem?
Great. How do I proceed?
Here are a few things to consider:- Don’t refrain from using TLS.
- Don’t play at being your own CA. Unless you are really confident you know what you’re getting into. It is no trivial thing.
- Understand that whatever you put into a certificate generated by a CA that supports CT, will be public: don’t put sensitive information in any of the fields.
- Verify what's in your certs with services like censys.io or crt.sh.
- If you don’t want a server to be reachable from the outside world, be sure to take additional precautions on a network level.
Afterthought
Written by

Jeroen Willemsen
Typical security jack-of-all-trades. Hands-on security architect with a nack for security, automation, and risk management. Jeroen has been involved in various OWASP projects. He enjoys a pentest every now and then, while helping organizations to get secure enough. Jeroen is often engaged in knowledge sharing through talks, blogs, projects at github, and trainings. Want to reach out? Check his allmylinks page.
Our Ideas
Explore More Blogs

Implementing Fine-grained Authorization in Databricks Unity Catalog
Introduction Data is a crucial yet sensitive asset for businesses. But how can we safeguard sensitive information while ensuring the right people have...
Contact