Axelspire

Why Certificate Automation Projects Fail

Most certificate automation initiatives solve the wrong problem. They automate broken processes faster.

Every enterprise we've worked with — Barclays, Deutsche Bank, TSB, Sky UK, Comcast — had the same story. Smart teams. Good intentions. Expensive tools. And certificate operations that still consumed thousands of engineering hours annually.

The pattern is predictable: buy a certificate lifecycle management platform, point it at your CAs, declare victory. Eighteen months later, you're still getting paged at 3AM because something expired that nobody knew existed.

Featured Tool Runs fully in-browser

PKI Health Radar

Drag the sliders to assess your current posture — scores update instantly.


The Problem Isn't Your Tools. It's Your Operational Model.

Certificate management vendors sell technology solutions to operational problems. Venafi, Keyfactor, DigiCert — they're all competing on features: more integrations, better discovery, faster issuance. None of them ask the harder question: why are your teams spending 40+ hours per incident on something that should be automated?

The answer is rarely "we need better automation." It's usually:

You can't automate what you can't see. Most enterprises discover 30-40% more certificates than they knew existed when they actually look. Shadow IT, developer shortcuts, M&A remnants, that contractor who spun up a service three years ago. Your CLM platform can only manage what it knows about.

Automation without governance is chaos at scale. Automating certificate issuance when you don't have clear ownership, approval workflows, or policy enforcement just means you'll create compliance problems faster.

The real cost is invisible. The line item in your security budget says "certificate management: £350K." The actual cost — scattered across 47 teams in manual tracking, renewal coordination, incident response, and senior engineers babysitting expiration dates — is closer to £5M.


Where the Money Actually Goes

When we mapped certificate costs across enterprise clients, the breakdown was consistent:

7% visible — The budget you can find. Software licenses, CA fees, the number finance actually tracks.

31% in labour — Manual tracking, renewal coordination, spreadsheet maintenance, calendar reminders. The work that doesn't show up in any project plan.

21% in firefighting — Emergency response when things slip. Weekend calls. War rooms. The 40+ person-hours per incident that nobody budgeted.

41% in lost innovation — Your senior engineers were hired to build. Instead, they're babysitting expiration dates. That's 20% of expensive talent doing work that should be automated.

The vendors don't talk about this because their tools don't fix it. You can't solve a £5M operational problem with a £250K software purchase.


The Real Cost of PKI Automation Failure

A single certificate outage now averages $11M in lost revenue and compliance fines. With 47-day certificate lifecycles becoming standard in regulated industries, one missed renewal can cascade across your entire infrastructure.

Real case study: Financial services company, 2024

A wildcard certificate for their payment processing API expired on a Friday evening. The certificate wasn't in their CLM platform — it was issued directly by the CA and tracked in a spreadsheet. The spreadsheet owner was on vacation. The certificate expired. By Monday morning, 72 hours of transaction processing had failed. The outage cost:

  • $4.2M in lost transaction fees
  • $2.1M in regulatory fines (PCI DSS non-compliance during outage)
  • $1.8M in incident response (war room, external consultants, forensics)
  • $2.9M in customer churn (clients moved to competitors)
  • Total: $11M

The certificate renewal would have taken 15 minutes. The outage took 72 hours. The cost was $11M.

This isn't unique. We've documented similar patterns across banking, healthcare, and fintech. The common thread: certificate automation projects fail because they focus on technology instead of organizational change.

Why 67% of PKI Automations Fail

The failure patterns are predictable:

  • Lift-and-shift trap: Buy a CLM platform, point it at your existing CAs, expect magic. The platform can only manage what it knows about. Shadow IT certificates remain invisible. Automation fails because it's incomplete.
  • Certificate sprawl blindness: Most enterprises discover 30-40% more certificates than they tracked. Automation projects that don't start with discovery are automating 60% of your infrastructure.
  • Ownership vacuum: Nobody owns certificate renewal. It's "IT's job" or "security's job" or "the application team's job." When it's everyone's job, it's nobody's job. Automation without clear ownership just automates chaos.
  • Change freeze collision: Certificate renewal happens during change freezes. Automation can't deploy during freezes. Manual processes resume. Automation gets abandoned.
  • Organizational friction: Approval workflows, compliance requirements, team silos. Technology solves none of these. Automation projects that don't address organizational structure fail because the organization doesn't support them.

85% of PKI implementation failures are organizational, not technical. The technology works. The organization doesn't.


How to Avoid the 67% Failure Rate

The framework that works:

  1. Assess: 90-day discovery phase. Find all certificates (you'll find 2-3x more than you expect). Map ownership. Identify policy gaps. Understand your actual operational model.
  2. Choose trust model: Decide on your PKI architecture before you choose tools. Hierarchical CA? Mesh? Bridge? Your organizational structure should drive this, not vendor marketing.
  3. Automate with ACME: Use ACME protocol (RFC 8555) for certificate issuance and renewal. It's the only protocol designed for true zero-touch renewal at scale. Works with Let's Encrypt, private CAs (Smallstep, Vault), and enterprise CAs (DigiCert, Sectigo).
  4. Monitor and iterate: Track the right metrics: time-to-renewal, mean-time-to-discovery-of-unknown-certificates, certificate coverage. Adjust processes based on what you learn.

Axelspire's platform engineering approach eliminates the organizational friction that kills most projects. We start with visibility, build the operational model first, then layer automation on top. The result: certificate operations that scale without consuming engineering time.


What Actually Works

After years inside enterprise certificate operations, we built 3AM around a different thesis: you have to understand your infrastructure before you can automate it.

That means:

Start with visibility, not issuance. Deploy passive discovery. See what you actually have before you change anything. Most "automation projects" should be "inventory projects" for the first 90 days.

Build the operational model first. Who owns what? What are the approval workflows? Where are the policy gaps? Answer these questions before you automate, or you'll automate the gaps too.

Don't rip and replace. Your existing CA infrastructure probably works fine. The problem isn't your PKI — it's the thousand manual touchpoints around it. Layer intelligence on top rather than forcing a migration nobody wants.

Measure the right things. Certificate count is vanity. Time-to-renewal is operational. Mean-time-to-discovery-of-unknown-certificates is strategic. Track what matters.


The 3AM Approach

We named it 3AM because that's when the phone rings. Senior engineers, hired to build products, dragged out of bed to manually rotate a certificate that expired because it wasn't in anybody's spreadsheet.

3AM is certificate intelligence infrastructure:

  • Visibility layer: Passive discovery from validation traffic. See everything without touching issuance workflows.
  • Issuance bridge: Single control point across all your CAs — internal PKI, public CAs, cloud services — without rip-and-replace.
  • Policy control: Governance, profiles, renewal windows, ITSM integration. Turn infrastructure into a management platform.
  • Zero-touch intelligence: Predictive analytics, anomaly detection, self-healing. Operations shift from execution to oversight.

The goal isn't "better certificate management." It's infrastructure that thinks ahead, so your engineers can get back to building.


Further Reading


See What You're Actually Spending

Our certificate cost calculator maps your real operational burden — not just the budget line, but the hidden labour, firefighting, and lost engineering time.

Calculate your certificate costs →

Or talk to us about a discovery engagement. Four weeks, no disruption, complete visibility.

Book a conversation →