← Methodology library
Methodology · Cert Activity Watch

Detecting cert-issuance anomalies without making public claims about anyone.

Cert Activity Watch flags statistically anomalous certificate issuance velocity (≥3σ above baseline) on the domains a customer monitors. This page documents the baseline math, the threshold rationale, the false-positive sources we know about, and the editorial line that defines who gets notified — and who never does.

Hard rule Cert Activity Watch is a private, paid-tier monitoring tool. Alerts go to the asset owner only. We do not publish "domains with anomalous cert activity" leaderboards, news posts, dashboards, or tweets. Soft-framed FYI public broadcasts ("we noticed activity at X.com") are not permitted. Post-confirmed retrospectives are the only public surface.

What this tool measures

Cert Activity Watch operates over Certificate Transparency (CT) log data, which is public. For each monitored domain it computes a rolling baseline of:

The "anomaly" event is a current-window measurement that exceeds 3 standard deviations above the trailing-90-day baseline on any of the four signals.

How we measure it

Our existing CT-log mining pipeline (used for key-reuse detection in the core scan) is reused. We monitor the major public CT logs (Google Argon/Xenon, Let's Encrypt Oak, Cloudflare Nimbus, DigiCert Yeti, Sectigo Mammoth) via certstream-style live ingestion and per-domain query.

For each monitored domain (apex), we maintain a per-day rolling counter table for ~90 days of history. The baseline (μ, σ) per signal is recomputed daily. A current-window anomaly fires when:

currentSignal_7d > μ + (3 × σ)

The 3σ threshold is the standard. Empirically we tune by signal type — issuance velocity uses 3σ, SAN expansion uses 2.5σ (lower variance baseline), key-rotation uses a categorical change-point detector rather than σ.

How it scores

Anomaly events are not scored continuously; they fire as discrete alerts. Each alert includes:

The alert is delivered via the customer's chosen channel (email, signed webhook) within minutes of detection.

What this tool does NOT claim

Known false-positive sources

Cert anomalies frequently arise from non-incident causes. Customers should expect — and Cipherwake alerts are calibrated to — the following benign sources:

Customer-side review is the gating step. We surface signal; we do not adjudicate cause.

Why we publish this list Vendors of opaque "AI-powered threat detection" rarely document their false-positive sources. We do, because the quickest way to lose a security buyer's trust is to surprise them with noise. If you know what's noise, you can tune your response posture.

Permitted use cases

  1. Self-monitoring. A team monitoring its own domains for unauthorized cert activity (a classic ATT&CK T1553.004 indicator).
  2. Vendor-portfolio monitoring. Monitoring a list of vendor domains for anomalous activity that may inform vendor-risk posture.
  3. M&A diligence. Monitoring a target's cert estate during diligence + integration windows.
  4. Incident-response support. Cross-checking cert activity against known incident timelines for the customer's own assets.

Disallowed use cases

Limitations + edge cases

Try it