Skip to main content
Public vs Private Trust

47-day certificates are solving a browser problem.

You're applying it to systems that don't have one.

Certificate lifetimes are shrinking because revocation doesn't work reliably on the public internet. But most of your systems aren't the public internet.

01 // The Shift Happening Now

Certificate lifetimes are collapsing.

Public CAs are reducing certificate lifetimes because revocation mechanisms like OCSP cannot be relied upon at internet scale. Instead of checking whether a certificate is still valid – they expire it faster.

398d
historical
90d
adopted
47d
emerging

This isn't a feature. It's a workaround.

02 // What This Actually Means

If you rely on public certificates:

You must automate renewal
You must accept short-lived credentials
You must tolerate occasional failure

This is necessary – for browser-facing systems.

But it has quietly become the default everywhere.

03 // The Problem

Public trust is being used where it doesn't belong.

Public certificate authorities were designed for one context. They're being deployed in another.

Designed for
  • Browsers
  • Unknown clients
  • Global trust
Used for
  • Internal APIs
  • Microservices
  • Kubernetes workloads

Why this happens

Tooling makes it easy

Modern infrastructure defaults to public ACME flows – cert-manager, ingress controllers, built-in Let's Encrypt. If it has a hostname, it gets a public certificate.

Internal PKI is too hard

Enterprise solutions like Active Directory Certificate Services or HashiCorp Vault provide correct trust models – but require specialist teams, complex deployment, and significant cost.

Engineers optimise for speed

The decision is rarely "what trust domain is this system in?" It's "we need HTTPS – Let's Encrypt works – ship it."

You are rotating certificates every 47 days for systems that never needed it.

Not because it's correct – because it's the only practical option available.

03b // The Compounding Risk

Certificate management doesn't just fail at scale. It fails by design.

Operational chaos drives teams toward wildcards and multi-SAN certs – which introduce a different class of failure entirely.

Operational Reality

Certificate Renewal Chaos

1

Let's Encrypt Breaks Silently

Certbot configs drift. DNS validation lapses. Cron jobs fail without alerting.

2

Every Service Is Different

Nginx, Go services, Java keystores – each has its own renewal method. Consistency is a myth.

3

Scaling Multiplies the Pain

3 services is manageable. 30 is fragile. 300 is a full-time job with another failure mode per service.

4

Rotation Means Downtime

Replacing a cert often means restarting the service. Even graceful reloads cause connection drops at scale.

5

No Single Pane of Glass

Certs scattered across servers, load balancers, CDNs, and container orchestrators. Nobody knows the full picture.

6

Mixed Provider Chaos

Let's Encrypt, internal CA, commercial certs – each has its own renewal flow and its own way of failing.

This doesn't scale.

10 manageable
100 fragile
500 inevitable failure

You don't miss certificates because you're careless.
You miss them because the system doesn't scale.

The Simplification Trap

Simplification turns isolated failures into systemic risk.

Wildcard and multi-SAN certificates bind APIs, frontends, admin panels, and internal services to the same certificate, the same renewal cycle, and the same validation event.

api · app · admin · payments · cdn *.company.com

5 services · 1 certificate · 1 renewal cycle

Validation fails → issuance fails
api app admin payments cdn → ALL down

One DV failure takes down every dependent service.

Security & Operational Risks
1

Single Point of Compromise

One key exposed = every subdomain compromised.

2

Least Privilege Violation

Staging holds the same cert as production APIs.

3

Increased Attack Surface

More servers storing the same private key.

4

Limited Scope Matching

Wildcards only match one subdomain level.

5

No Granular Visibility

Can't track or validate per service.

6

Compliance & Policy

Restricted in financial and regulated environments.

04 // The Missing Concept

Trust domains.

There are two fundamentally different trust models. The certificates are the same. The trust model is not.

Public Trust
  • Designed for browsers
  • Unknown clients
  • No reliable revocation
  • Short-lived certificates (47–90 days)
  • Global validation required
Private Trust
  • Known identities
  • Controlled network
  • Real revocation possible
  • Policy enforcement
  • mTLS-based authentication

Same technology. Different model. Most organisations apply the public model to private systems.

05 // Why This Matters

The impact of the wrong trust model.

Operational
  • Unnecessary renewal overhead
  • ACME / DNS complexity
  • Increased failure surface
Security
  • No control over internal trust
  • Implicit trust between services
  • No identity policy enforcement
Architectural
  • No trust domain separation
  • Can't scale machine identity
  • Hidden blast radius
06 // A Better Approach

Separate trust domains.

Public certificates

For browser-facing systems where global trust is required.

Private certificates

For internal systems where you control the trust boundary.

Introduce controlled trust

Dedicated certificate authority
Real-time revocation
Policy-driven issuance
mTLS identity
[cyphrs]

Enterprise-grade trust – without enterprise complexity.

Your own internal certificate authority with full control over issuance, real revocation, policy enforcement, and visibility across every certificate and system.

Internal certificate authority
Full issuance control
Real revocation
Complete visibility
No PKI team required No complex deployment

Every certificate is an identity.

Every identity is trusted by something.

Understanding certificates is step one.
Controlling trust is what comes next.

Stop rotating certificates unnecessarily.

Start using the right trust model.