Browse Definitions :
Definition

Let's Encrypt

Let's Encrypt is a free, open and automated certificate authority (CA) provided as a service by the Internet Security Research Group (ISRG).

Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.

Using a protocol called Automated Certificate Management Environment (ACME), Let's Encrypt simplifies through automation. All of the processes involved in providing proof of control for a website such as obtaining, renewing and revoking certificates, are automated. With a simple click (or command methods), HTTPS security can be enabled for any site.

The basics of Let’s Encrypt:

  • domain name owners can obtain trusted certificates for their sites free of charge.
  • Through the interaction with the CA, server software can obtain a certificate, securely configure it and automatically manage renewal.
  • Let’s Encrypt is designed to serve as a platform for promoting TLS (Transport Layer Security) best practices.
  • Information about all certificates issued or revoked will be made publicly available.
  • The ACME protocol will also be made publicly available as an open standard.

Let’s Encrypt is hosted by the Linux Foundation. Project sponsors include the Mozilla Foundation, IdenTrust, Akamai, Cisco, the Electronic Frontier Foundation (EFF) and Automattic. The project is part of a long-term goal to encrypt the entirety of the web.

See a presentation on Let's Encrypt by the EFF:

This was last updated in June 2015

Continue Reading About Let's Encrypt

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close