<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>The Ops Community ⚙️: CertKit</title>
    <description>The latest articles on The Ops Community ⚙️ by CertKit (@certkit).</description>
    <link>https://community.ops.io/certkit</link>
    <image>
      <url>https://community.ops.io/images/iZs6S6PLXFYBJtvV0N4-S1Bc6jrWBzfxgn8MqewQwlw/rs:fill:90:90/g:sm/mb:500000/ar:1/aHR0cHM6Ly9jb21t/dW5pdHkub3BzLmlv/L3JlbW90ZWltYWdl/cy91cGxvYWRzL29y/Z2FuaXphdGlvbi9w/cm9maWxlX2ltYWdl/LzEwNi84NTdmM2Yw/Ny1lYjdhLTRlOWQt/OGM4NC1kZDI1ZGFj/NzViMGMucG5n</url>
      <title>The Ops Community ⚙️: CertKit</title>
      <link>https://community.ops.io/certkit</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://community.ops.io/feed/certkit"/>
    <language>en</language>
    <item>
      <title>How to Audit Your Domain's Certificate History (And Why You Should Be Terrified)</title>
      <dc:creator>Todd H. Gardner</dc:creator>
      <pubDate>Tue, 28 Oct 2025 18:45:14 +0000</pubDate>
      <link>https://community.ops.io/certkit/how-to-audit-your-domains-certificate-history-and-why-you-should-be-terrified-lah</link>
      <guid>https://community.ops.io/certkit/how-to-audit-your-domains-certificate-history-and-why-you-should-be-terrified-lah</guid>
      <description>&lt;p&gt;You probably have no idea how many SSL certificates exist for your domains. Or who has them.&lt;/p&gt;

&lt;p&gt;Most ops teams track the certificates they issue. Nobody tracks the certificates they didn't issue. The ones from your previous CDN. Your former hosting provider. That contractor who left six months ago. They're all still out there. Still valid.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://certkit.io/blog/bygonessl-and-the-certificate-that-wouldnt-die" rel="noopener noreferrer"&gt;BygoneSSL research&lt;/a&gt; found 1.5 million domains with valid certificates owned by the wrong people. Your domains are probably in that list.&lt;/p&gt;

&lt;p&gt;Time to find out.&lt;/p&gt;

&lt;h2&gt;
  
  
  Start with Certificate Transparency Logs
&lt;/h2&gt;

&lt;p&gt;Every publicly trusted certificate gets logged. That's good news. It means you can find them.&lt;/p&gt;

&lt;p&gt;Go to &lt;a href="https://www.certkit.io/tools/ct-logs/" rel="noopener noreferrer"&gt;CertKit Certificate Search&lt;/a&gt; and search for your domain. You want to see everything. Not just valid certs. Everything.&lt;/p&gt;

&lt;p&gt;What you'll find will make you uncomfortable.&lt;/p&gt;

&lt;p&gt;I searched for a client's domain last week. Found over 100 certificates. They knew about 3.&lt;/p&gt;

&lt;p&gt;The rest? Old hosting providers. Development agencies. That "quick test" someone ran with Let's Encrypt. A wildcard certificate from their previous CDN that doesn't expire until 2026.&lt;/p&gt;

&lt;p&gt;Each one is a potential security incident.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Vendors You Forgot About
&lt;/h2&gt;

&lt;p&gt;Look at the issuer field for each certificate. See Let's Encrypt? Sectigo? DigiCert? Now ask yourself: who uses those CAs?&lt;/p&gt;

&lt;p&gt;That Sectigo certificate from 2023? Probably your old CDN. Still valid for another 200 days.&lt;/p&gt;

&lt;p&gt;The Let's Encrypt cert renewed every 90 days? Could be that staging server your contractor set up. The one that's supposedly decommissioned. Except someone's still renewing the certificate.&lt;/p&gt;

&lt;p&gt;The DigiCert wildcard? Your previous hosting provider included it "free" with your plan. You moved providers. They kept the certificate.&lt;/p&gt;

&lt;h2&gt;
  
  
  Check the SANs (Subject Alternative Names)
&lt;/h2&gt;

&lt;p&gt;This is where things get really fun. Multi-domain certificates.&lt;/p&gt;

&lt;p&gt;Your domain might be bundled with 50 other domains on the same certificate. Maybe 500. I've seen CDN certificates with over 700 domains.&lt;/p&gt;

&lt;p&gt;Here's why that matters: If any of those domains changes ownership, the new owner can revoke the entire certificate. Your site goes down because some random domain on your shared certificate got sold.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Subdomain Problem
&lt;/h2&gt;

&lt;p&gt;Wildcards are convenient. They're also dangerous.&lt;/p&gt;

&lt;p&gt;That *.yourdomain.com certificate you issued two years ago? It works for every subdomain. Including the ones you delegated to vendors. The test environments you forgot about. The staging server that "doesn't exist anymore."&lt;/p&gt;

&lt;p&gt;Search for these patterns in your CT logs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;*.yourdomain.com (wildcards)&lt;/li&gt;
&lt;li&gt;staging.yourdomain.com&lt;/li&gt;
&lt;li&gt;test.yourdomain.com
&lt;/li&gt;
&lt;li&gt;dev.yourdomain.com&lt;/li&gt;
&lt;li&gt;Any vendor-specific subdomains&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each valid certificate is active infrastructure, whether you know about it or not.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Can Request Certificates?
&lt;/h2&gt;

&lt;p&gt;This is the question nobody asks. Who can prove control of your domain?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Anyone with access to your DNS&lt;/li&gt;
&lt;li&gt;Anyone receiving admin emails&lt;/li&gt;
&lt;li&gt;Anyone who can place files on your web server&lt;/li&gt;
&lt;li&gt;Anyone with access to your cloud account&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's a lot of people. Current employees. Former employees. Your DNS provider. Your CDN. Your hosting company.&lt;/p&gt;

&lt;p&gt;They can all request certificates. Right now. And you won't know until you check the CT logs.&lt;/p&gt;

&lt;h2&gt;
  
  
  What To Do About It
&lt;/h2&gt;

&lt;p&gt;You can't revoke certificates you don't control. Revocation barely works anyway. But you can minimize future damage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Immediate steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Document every certificate you find. Note the expiration dates.&lt;/li&gt;
&lt;li&gt;CAA records. Set them now. Lock down which CAs can issue certificates.&lt;/li&gt;
&lt;li&gt;Monitor CT logs. Weekly at minimum. Daily is better. Or monitor them continuously with CertKit.&lt;/li&gt;
&lt;li&gt;Rotate credentials after vendor changes. DNS passwords, cloud API keys, everything.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Long term fixes:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Short certificate lifespans. The &lt;a href="https://www.certkit.io/47-day-certs" rel="noopener noreferrer"&gt;47 day certificates&lt;/a&gt; everyone's complaining about? They solve this problem. A certificate issued today expires before real damage happens.&lt;/p&gt;

&lt;p&gt;Certificate automation. Manual processes can't track this. You need tools that discover, monitor, and manage certificates continuously.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Want to automate certificate discovery and monitoring? &lt;a href="https://www.certkit.io" rel="noopener noreferrer"&gt;CertKit&lt;/a&gt; tracks every certificate for your domains, not just the ones you issued. Because the certificates you don't know about are the ones that hurt you.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>secops</category>
      <category>certificates</category>
    </item>
    <item>
      <title>Let's Encrypt Ate Everyone's Lunch: From 0% to 59% Market Share</title>
      <dc:creator>Todd H. Gardner</dc:creator>
      <pubDate>Mon, 06 Oct 2025 21:13:49 +0000</pubDate>
      <link>https://community.ops.io/certkit/lets-encrypt-ate-everyones-lunch-from-0-to-59-market-share-5h2l</link>
      <guid>https://community.ops.io/certkit/lets-encrypt-ate-everyones-lunch-from-0-to-59-market-share-5h2l</guid>
      <description>&lt;p&gt;Remember paying $300 for an SSL certificate?&lt;/p&gt;

&lt;p&gt;Of course you do. It was 2015. You had a budget line item called "certificates." Purchasing needed three approvals. The renewal reminder went to Dave, who left six months ago.&lt;/p&gt;

&lt;p&gt;Then Let's Encrypt showed up and chose violence.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Numbers Don't Lie
&lt;/h2&gt;

&lt;p&gt;2016: Let's Encrypt had 0.1% market share.&lt;br&gt;
2024: 59%.&lt;/p&gt;

&lt;p&gt;That's not growth. That's annihilation.&lt;/p&gt;

&lt;p&gt;They didn't just disrupt the certificate industry. They ate it. While the traditional CAs were figuring out how to charge more for wildcard domains, Let's Encrypt was issuing millions of free certificates. Daily. With 90-day lifetimes that forced everyone to automate whether they liked it or not.&lt;/p&gt;

&lt;p&gt;Which, surprise, is exactly what we needed for &lt;a href="https://www.certkit.io/blog/47-day-certificate-ultimatum" rel="noopener noreferrer"&gt;47 day certificates&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;
  
  
  The Business Model That Shouldn't Have Worked
&lt;/h2&gt;

&lt;p&gt;Here's what Let's Encrypt proposed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Free certificates&lt;/li&gt;
&lt;li&gt;No phone support
&lt;/li&gt;
&lt;li&gt;No sales team&lt;/li&gt;
&lt;li&gt;90-day expiration (not the 3-year cash cows)&lt;/li&gt;
&lt;li&gt;API-only provisioning&lt;/li&gt;
&lt;li&gt;Funded by... donations?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The CAs laughed. Actually laughed.&lt;/p&gt;

&lt;p&gt;"Nobody will trust free certificates."&lt;br&gt;
"Enterprises need hand-holding."&lt;br&gt;
"90 days is too short."&lt;br&gt;
"Automation is too complex for normal ops teams."&lt;/p&gt;

&lt;p&gt;Turns out normal ops teams were already automating everything else. Adding one more API call? Not exactly rocket science.&lt;/p&gt;
&lt;h2&gt;
  
  
  The Part Nobody Talks About
&lt;/h2&gt;

&lt;p&gt;Let's Encrypt didn't win because they were free.&lt;/p&gt;

&lt;p&gt;They won because they removed the friction.&lt;/p&gt;

&lt;p&gt;No sales calls. No "contact us for pricing." No validation documents. No account managers. No renewal reminders. No phone trees. No support tickets.&lt;/p&gt;

&lt;p&gt;Just: Here's your cert. See you in 90 days.&lt;/p&gt;

&lt;p&gt;We'd been so beaten down by the certificate industrial complex that we forgot what simple looked like.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;certbot certonly &lt;span class="nt"&gt;--webroot&lt;/span&gt; &lt;span class="nt"&gt;-w&lt;/span&gt; /var/www/html &lt;span class="nt"&gt;-d&lt;/span&gt; example.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Done. Cert issued. Automatically renewed until the heat death of the universe.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Panic Was Delicious
&lt;/h2&gt;

&lt;p&gt;Watch a $600 million industry realize it's been disrupted by a nonprofit:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2016: "It's just for hobbyists."&lt;/li&gt;
&lt;li&gt;2017: "Enterprises will never adopt it."&lt;/li&gt;
&lt;li&gt;2018: "Our Extended Validation certificates are superior."&lt;/li&gt;
&lt;li&gt;2019: "We provide better support."&lt;/li&gt;
&lt;li&gt;2020: "Our management platform is worth the cost."&lt;/li&gt;
&lt;li&gt;2021: "Please?"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The best part? They started offering free certificates too. But with "premium features." Like what? Support for the free certificates that don't need support because they're automated?&lt;/p&gt;

&lt;p&gt;DigiCert bought Symantec's certificate business for $950 million in 2017.&lt;/p&gt;

&lt;p&gt;That same year, Let's Encrypt was running on a $2.5 million budget.&lt;/p&gt;

&lt;p&gt;And winning.&lt;/p&gt;

&lt;h2&gt;
  
  
  They Fixed the Wrong Problem
&lt;/h2&gt;

&lt;p&gt;The CAs spent years optimizing the wrong thing. Making certificate purchasing "easier." Building better dashboards. Adding more validation levels.&lt;/p&gt;

&lt;p&gt;Let's Encrypt realized the problem wasn't purchasing.&lt;/p&gt;

&lt;p&gt;It was that certificates existed at all.&lt;/p&gt;

&lt;p&gt;Make them invisible. Make them automatic. Make them someone else's problem (specifically: nobody's problem).&lt;/p&gt;

&lt;p&gt;Eight years later, Let's Encrypt issues certificates for most of the encrypted web. Your bank, your cloud provider, probably this blog.&lt;/p&gt;

&lt;p&gt;All running on infrastructure that the "serious" CAs said would never work.&lt;/p&gt;

&lt;p&gt;Turns out "never" is about 8 years in certificate time.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>secops</category>
      <category>certificates</category>
      <category>security</category>
    </item>
    <item>
      <title>Why Every DevOps Team Has a Certificate Horror Story</title>
      <dc:creator>Todd H. Gardner</dc:creator>
      <pubDate>Fri, 19 Sep 2025 15:40:45 +0000</pubDate>
      <link>https://community.ops.io/certkit/why-every-devops-team-has-a-certificate-horror-story-fk1</link>
      <guid>https://community.ops.io/certkit/why-every-devops-team-has-a-certificate-horror-story-fk1</guid>
      <description>&lt;h2&gt;
  
  
  The Certificate That Ruined Christmas
&lt;/h2&gt;

&lt;p&gt;It was December 23rd, 4:47 PM. Sarah was halfway through her third glass of office party punch when her phone exploded. Production was down. Not slow. Not degraded. Dead.&lt;/p&gt;

&lt;p&gt;The wildcard certificate had expired.&lt;/p&gt;

&lt;p&gt;The one that covered *.api.company.com, *.admin.company.com, and seventeen other subdomains nobody documented. The renewal script? It had been failing silently for six weeks. The logs? Rotated into oblivion. The person who wrote it? Left for greener pastures in October.&lt;/p&gt;

&lt;p&gt;Sarah spent Christmas Eve on a Zoom call with three other engineers, manually generating certificates while the CEO asked "how did this happen?" every fifteen minutes.&lt;/p&gt;

&lt;p&gt;Every DevOps team has this story. The details change, but the pain is universal.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Museum of Certificate Disasters
&lt;/h2&gt;

&lt;h3&gt;
  
  
  The Demo Day Special
&lt;/h3&gt;

&lt;p&gt;Picture this: Your CEO is presenting to potential investors. Big screen. Lots of money in the room. Click to the product demo and—browser warning. "Your connection is not private." &lt;/p&gt;

&lt;p&gt;Turns out that staging environment you spun up six months ago for "just this one demo"? Its certificate expired yesterday. The renewal was handled by Gary's laptop. Gary's in Bali. Gary doesn't check Slack on vacation.&lt;/p&gt;

&lt;p&gt;The CEO improvises. The investors are "concerned about technical operations." You update your resume.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Acquisition Surprise
&lt;/h3&gt;

&lt;p&gt;Your company just acquired a smaller competitor. Congratulations! You now own:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;47 domains nobody has a list of&lt;/li&gt;
&lt;li&gt;Certificates from three different CAs&lt;/li&gt;
&lt;li&gt;At least six that expired last year but "the sites still work somehow"&lt;/li&gt;
&lt;li&gt;A WordPress multisite with a cert that expires tomorrow&lt;/li&gt;
&lt;li&gt;No documentation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The previous team's solution? A spreadsheet on someone's desktop titled "certs_final_FINAL_v2_actually_final.xlsx". It was last updated in 2021.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Prometheus Punishment
&lt;/h3&gt;

&lt;p&gt;You built beautiful monitoring. Prometheus, Grafana, the works. Alerts for everything. CPU, memory, disk space, network latency, even that custom metric for coffee machine status.&lt;/p&gt;

&lt;p&gt;The monitoring certificate expired on Tuesday.&lt;/p&gt;

&lt;p&gt;Nobody knew because... the monitoring was down.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Load Balancer Lottery
&lt;/h3&gt;

&lt;p&gt;Three identical load balancers. Same config. Same automation. Same certificate renewal script.&lt;/p&gt;

&lt;p&gt;Two renewed perfectly. The third didn't.&lt;/p&gt;

&lt;p&gt;Why? Nobody knows. The logs show success. The script returned 0. The old certificate is still being served. You check everything twice. Time zones? Permissions? Phase of the moon?&lt;/p&gt;

&lt;p&gt;Four hours later you manually replace it and add "investigate later" to a ticket that will never be investigated.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Forgotten Fleet
&lt;/h3&gt;

&lt;p&gt;That certificate scanner you ran last month found 73 certificates across your infrastructure. You manage 12 of them. The others?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The printer management interface (apparently it has HTTPS?)&lt;/li&gt;
&lt;li&gt;Bob's development VM that's somehow internet-facing&lt;/li&gt;
&lt;li&gt;A Grafana instance from a hackathon three years ago&lt;/li&gt;
&lt;li&gt;The old CEO's vanity project that "we're definitely shutting down next month" for the past two years&lt;/li&gt;
&lt;li&gt;Something called "test-server-do-not-delete-important"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Half expired already. The other half expire next month. None are in your renewal automation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Keeps Happening
&lt;/h2&gt;

&lt;p&gt;We're smart people. We automate everything. We have CI/CD pipelines that would make NASA jealous. So why do certificates keep biting us?&lt;/p&gt;

&lt;p&gt;Because certificate management exists in the gap between "too important to ignore" and "too boring to do right."&lt;/p&gt;

&lt;p&gt;It's not exciting like Kubernetes. It's not trendy like observability. It's just... certificates. So we cobble together the minimum viable solution and promise to "revisit this next quarter."&lt;/p&gt;

&lt;p&gt;Next quarter never comes. Until 4:47 PM on December 23rd.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Universal Constants of Certificate Pain
&lt;/h2&gt;

&lt;p&gt;Every certificate horror story shares the same elements:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It's always the one you forgot about.&lt;/strong&gt; Never the main production cert you monitor obsessively. It's the Jenkins box. The VPN appliance. That API endpoint only accounting uses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The person who knows is gone.&lt;/strong&gt; They left for a startup. Or they're on parental leave. Or they just forgot because they set it up three years ago after four beers at the company offsite.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The documentation lies.&lt;/strong&gt; If it exists at all. That runbook? It references servers that were decommissioned in 2020. The wiki page? Last updated by an intern who "thinks this is how it works."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It happens at the worst possible time.&lt;/strong&gt; During the big demo. Black Friday. When you're on vacation. When the senior engineer is at a wedding. Murphy's Law was written about SSL certificates.&lt;/p&gt;

&lt;h2&gt;
  
  
  Breaking the Cycle
&lt;/h2&gt;

&lt;p&gt;Here's the thing: we've all tried to fix this. We've written the scripts. Built the automation. Created the runbooks. Set up the monitoring.&lt;/p&gt;

&lt;p&gt;But maintaining certificate infrastructure isn't your job. It's a distraction from your actual job. You didn't become a DevOps engineer to babysit OpenSSL.&lt;/p&gt;

&lt;p&gt;That's why we keep having these disasters. We treat &lt;a href="https://www.certkit.io/blog/why-you-built-your-own-certificate-management" rel="noopener noreferrer"&gt;certificate management like a side project&lt;/a&gt; instead of the critical infrastructure it actually is. We wouldn't run our own power plant. Why are we running our own certificate authority?&lt;/p&gt;

&lt;h2&gt;
  
  
  Your Horror Story
&lt;/h2&gt;

&lt;p&gt;Every DevOps engineer reading this is nodding along, remembering their own certificate disaster. The one that ruined a weekend. Or a holiday. Or a career.&lt;/p&gt;

&lt;p&gt;Maybe it's time to stop collecting these war stories.&lt;/p&gt;

&lt;p&gt;Maybe it's time to let someone else worry about whether the certificate renewal script will work next month.&lt;/p&gt;

&lt;p&gt;Maybe it's time to stop playing certificate roulette and admit that some problems are worth paying someone else to solve.&lt;/p&gt;

&lt;p&gt;But until then? Check your certificates. That Jenkins box is probably expiring next week.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>secops</category>
      <category>security</category>
    </item>
    <item>
      <title>Apple's 47-Day SSL Certificate Plan is Your Next On-Call Nightmare</title>
      <dc:creator>Todd H. Gardner</dc:creator>
      <pubDate>Wed, 03 Sep 2025 21:09:04 +0000</pubDate>
      <link>https://community.ops.io/certkit/apples-47-day-ssl-certificate-plan-is-your-next-on-call-nightmare-2aec</link>
      <guid>https://community.ops.io/certkit/apples-47-day-ssl-certificate-plan-is-your-next-on-call-nightmare-2aec</guid>
      <description>&lt;p&gt;Remember when SSL certificates lasted three years? &lt;/p&gt;

&lt;p&gt;Pepperidge Farm remembers.&lt;/p&gt;

&lt;p&gt;In 2020, Apple decided that was too easy. Now we're heading toward 47-day certificates. Not 45. Not 50. Forty-seven days, because apparently Apple's random number generator picked that one.&lt;/p&gt;

&lt;p&gt;Let me walk you through the timeline of how we got here, and why your 2027 is about to become certificate renewal hell.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Timeline to Madness
&lt;/h2&gt;

&lt;h3&gt;
  
  
  The Good Old Days (Pre-2020)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Certificate Lifespan: 3 years (1,095 days)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Life was simple. You'd buy a certificate, install it, set a calendar reminder for 2.5 years later, then forget about it. Sure, sometimes that reminder got lost and production went down, but that was a once-every-three-years problem.&lt;/p&gt;

&lt;p&gt;My team managed 200+ certificates this way. One spreadsheet. Quarterly reviews. Bob from accounting could handle renewals. It worked.&lt;/p&gt;

&lt;h3&gt;
  
  
  September 2020: The First Cut
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Certificate Lifespan: 1 year (398 days)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Apple announces at their developer conference that Safari will only trust certificates issued for 398 days or less. Not 365 days like a normal year. 398 days, because Apple.&lt;/p&gt;

&lt;p&gt;Google immediately agrees. Mozilla follows. The certificate authorities cave within weeks.&lt;/p&gt;

&lt;p&gt;Suddenly, your annual renewal process needs to happen... annually. Revolutionary.&lt;/p&gt;

&lt;h3&gt;
  
  
  March 2026: The Plot Thickens
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Certificate Lifespan: 200 days&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;"Why stop at one year?" asks someone at Apple who clearly doesn't manage certificates.&lt;/p&gt;

&lt;p&gt;Next March—that's in 6 months, people—we drop to 200 days.&lt;/p&gt;

&lt;p&gt;200 days. That's a renewal every six and a half months. Your nice quarterly review process? Useless. That junior developer who "figured out the cert stuff"? They're now spending 15% of their time on certificates.&lt;/p&gt;

&lt;h3&gt;
  
  
  March 2027: Getting Ridiculous
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Certificate Lifespan: 100 days&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A renewal every three months. Four times a year. Per certificate.&lt;/p&gt;

&lt;p&gt;Got 100 certificates? That's 400 renewals annually. That's more than one renewal every single working day.&lt;/p&gt;

&lt;h3&gt;
  
  
  March 2029: Peak Insanity
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Certificate Lifespan: 47 days&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Forty. Seven. Days.&lt;/p&gt;

&lt;p&gt;Why 47? Who knows. Maybe someone at Apple lost a bet. Maybe it's a Hitchhiker's Guide reference. Maybe they just hate us.&lt;/p&gt;

&lt;p&gt;At 47 days, you're renewing certificates eight times per year. Per certificate. &lt;/p&gt;

&lt;p&gt;Let's do the math that Apple apparently didn't:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;100 certificates × 8 renewals = 800 renewal events per year&lt;/li&gt;
&lt;li&gt;800 renewals ÷ 250 working days = 3.2 renewals every single day&lt;/li&gt;
&lt;li&gt;Zero room for error&lt;/li&gt;
&lt;li&gt;Zero time for vacation&lt;/li&gt;
&lt;li&gt;Zero patience left&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Operational Reality Nobody's Talking About
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Manual Processes Are Dead
&lt;/h3&gt;

&lt;p&gt;That runbook where you SSH into servers and copy certificates? Dead.&lt;/p&gt;

&lt;p&gt;The Ansible playbook Jim wrote in 2019? Dead.&lt;/p&gt;

&lt;p&gt;At 47-day intervals, a single failure cascades immediately. Miss one renewal because someone's on vacation? You've got 47 days to catch it. Except you won't, because certificate #2 is expiring tomorrow, and #3 the day after that.&lt;/p&gt;

&lt;h3&gt;
  
  
  Change Windows Become Impossible
&lt;/h3&gt;

&lt;p&gt;"We only deploy on Tuesdays between 2-4 PM after CAB approval."&lt;/p&gt;

&lt;p&gt;Cool story. Your certificates expire when they expire. That carefully planned change management process? It's about to meet the reality of 8x more certificate deployments.&lt;/p&gt;

&lt;p&gt;Your options:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Get blanket approval for certificate renewals (good luck with that audit)&lt;/li&gt;
&lt;li&gt;Automate everything (should've started yesterday)&lt;/li&gt;
&lt;li&gt;Watch everything burn (honestly, might be easier)&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  The Hidden Costs Multiply
&lt;/h3&gt;

&lt;p&gt;Every certificate renewal isn't just swapping a file:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Load balancer configs need updating&lt;/li&gt;
&lt;li&gt;CDN certificates need propagation
&lt;/li&gt;
&lt;li&gt;Service restarts risk downtime&lt;/li&gt;
&lt;li&gt;Monitoring needs to verify the update&lt;/li&gt;
&lt;li&gt;Documentation needs to reflect changes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At 47 days, you're doing this dance constantly. Forever. Until you die or change careers.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Tools Are Not Ready
&lt;/h2&gt;

&lt;p&gt;Your $50,000/year monitoring platform that "supports everything"? Doesn't support 47-day automated rotation.&lt;/p&gt;

&lt;p&gt;Your enterprise load balancer? Manual process only.&lt;/p&gt;

&lt;p&gt;Your CDN? API supports updates, but rate-limits you to 10 changes per month.&lt;/p&gt;

&lt;p&gt;Your managed Kubernetes service? Actually, they're probably fine. But everything else is screwed.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Actually Means for Your Team
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Staffing Reality
&lt;/h3&gt;

&lt;p&gt;At 47-day certificates, certificate management becomes a full-time job. Not hyperbole. Actual math:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;200 certificates × 8 renewals × 30 minutes per renewal = 800 hours/year&lt;/li&gt;
&lt;li&gt;That's 0.4 FTE just for basic renewals&lt;/li&gt;
&lt;li&gt;Add troubleshooting, failures, and coordination: 1.0 FTE minimum&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Congratulations, you're hiring a Certificate Engineer. That's a real job title now.&lt;/p&gt;

&lt;h3&gt;
  
  
  Automation Isn't Optional Anymore
&lt;/h3&gt;

&lt;p&gt;"We'll automate it eventually" becomes "We automate it or we die."&lt;/p&gt;

&lt;p&gt;But here's what automation actually means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rewriting deployment pipelines&lt;/li&gt;
&lt;li&gt;Updating every system configuration&lt;/li&gt;
&lt;li&gt;Building certificate discovery tools&lt;/li&gt;
&lt;li&gt;Creating fallback procedures&lt;/li&gt;
&lt;li&gt;Testing failure scenarios&lt;/li&gt;
&lt;li&gt;Training everyone on the new process&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Conservative estimate: 6-12 months of engineering work. For certificates. The things that used to just work.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Path Forward (Since Apple Won't Stop)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Option 1: Full Automation or Death
&lt;/h3&gt;

&lt;p&gt;Invest heavily now. And I mean now. Not next quarter. Not after the current sprint.&lt;/p&gt;

&lt;p&gt;Build certificate automation that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Handles every system, not just the easy ones&lt;/li&gt;
&lt;li&gt;Fails gracefully with automatic rollbacks&lt;/li&gt;
&lt;li&gt;Alerts intelligently without noise&lt;/li&gt;
&lt;li&gt;Scales to thousands of certificates&lt;/li&gt;
&lt;li&gt;Works with your legacy nightmare systems&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Option 2: Managed Certificate Services
&lt;/h3&gt;

&lt;p&gt;Give up. Pay someone else. Let it be their problem.&lt;/p&gt;

&lt;p&gt;Whether it's your CDN provider, a managed certificate service, or &lt;a href="https://www.certkit.io/blog/why-we-built-certkit" rel="noopener noreferrer"&gt;something we built because we're equally frustrated&lt;/a&gt;, the point is: stop pretending this is sustainable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Option 3: Proxy Everything
&lt;/h3&gt;

&lt;p&gt;Put all your certificates at the edge. Cloudflare, Akamai, whatever. Let them handle the 47-day nonsense. Your internal systems keep their self-signed certs that last forever.&lt;/p&gt;

&lt;p&gt;Not elegant. Not ideal. But it works.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Part Where I Stop Complaining and Admit Reality
&lt;/h2&gt;

&lt;p&gt;Look, I get it. Shorter certificate lifespans increase security. Compromised certificates have less time to cause damage. Automated systems are more reliable than manual processes. In theory.&lt;/p&gt;

&lt;p&gt;But theory and practice are only the same in theory.&lt;/p&gt;

&lt;p&gt;In practice, we're forcing massive operational changes on an industry that still runs COBOL in production. We're expecting perfect automation from companies that can barely keep their primary systems running. We're creating complexity that will cause more outages than it prevents.&lt;/p&gt;

&lt;h2&gt;
  
  
  Your Action Items for This Week
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Count your certificates.&lt;/strong&gt; All of them. Including that test server everyone forgot about.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Calculate your renewal burden.&lt;/strong&gt; Multiply by 8 for the 2027 reality.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Start the automation discussion.&lt;/strong&gt; Today. Not tomorrow.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Budget for tooling.&lt;/strong&gt; You're going to need it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Update your resume.&lt;/strong&gt; Just in case.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The 47-day certificate apocalypse is coming whether we're ready or not. Apple's decided. Google's agreed. The certificate authorities are implementing it.&lt;/p&gt;

&lt;p&gt;We built &lt;a href="https://www.certkit.io/blog/why-we-built-certkit" rel="noopener noreferrer"&gt;CertKit&lt;/a&gt; because we saw this coming and decided to do something about it. But whether you use our solution, build your own, or just pray to the certificate gods, you need to act now.&lt;/p&gt;

&lt;p&gt;Because in 2029, while you're renewing certificates for the third time this month, remember: Apple thinks this is making the internet "more secure."&lt;/p&gt;

&lt;p&gt;Sure it is.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;How are you preparing for 47-day certificates? Drop your horror stories and survival strategies in the comments. Misery loves company, and we certificate wranglers need all the help we can get.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>secops</category>
      <category>security</category>
      <category>automation</category>
      <category>tools</category>
    </item>
  </channel>
</rss>
