Registry Security Overview
Security posture for the public transparency log at registry.attestlayer.com.
This page describes registry.attestlayer.com only: public log entries, checkpoints, witnesses, anchors, public keys, verification bundles, and other public registry endpoints.
Trust model
The Registry is built as a public append-only transparency surface. Trust comes from published public keys, signed checkpoints, Merkle proofs, and public continuity material rather than from a private account session.
- Checkpoint signatures are published and independently reviewable.
- Issuer and registry keys are exposed through public JWKS endpoints.
- The registry is read-only for the public surface described here.
Operational protections
- Registry is served over HTTPS and protected with baseline browser and delivery controls.
- The public service exposes verification and transparency material, not customer account mutation endpoints.
- Operational logging, integrity reconciliation, and abuse controls are used to protect availability and traceability.
- External witnessing or anchoring must not be inferred unless the registry explicitly states it is active.
What Registry does not claim
- The Registry does not certify a submitter's underlying controls.
- It does not prove facts that are not represented by the published cryptographic commitments.
- It is not a substitute for legal review, procurement review, or an audit report.
Security reports should be sent through the Registry-specific disclosure page at /vulnerability-disclosure.
Registry is a public read-only transparency surface. It is not a checkout, subscription, or customer account portal.