The Good Tech Companies - Modernizing PKI for Zero Trust and Microservices: Insights from Rakesh Keshava
Episode Date: September 18, 2025This story was originally published on HackerNoon at: https://hackernoon.com/modernizing-pki-for-zero-trust-and-microservices-insights-from-rakesh-keshava. Rakesh Keshav...a explains how modern PKI with automation, short-lived certs, and crypto-agility enables zero trust and secure microservices in 2025. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #modern-pki-zero-trust, #pki-modernization-2025, #rakesh-keshava-cybersecurity, #short-lived-certificates-pki, #crypto-agility-pki, #pki-for-microservices, #identity-centric-pki, #good-company, and more. This story was written by: @jonstojanjournalist. Learn more about this writer by checking @jonstojanjournalist's about page, and for more stories, please visit hackernoon.com. Legacy PKI is failing in a zero-trust, microservices world. Rakesh Keshava outlines how modern PKI must evolve—short-lived, automated, identity-bound, auditable, and crypto-agile. His insights show how organizations can secure dynamic workloads and hybrid clouds, making PKI the backbone of digital trust in 2025 and beyond.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Modernizing PKI for Zero Trust and Microservices.
Insights from Rakesh Kashava by John Stoy and journalist.
In the ever-evolving digital landscape, the foundation of secure communication and trusted identity,
public key infrastructure, PQI, is being pushed to ITS limits.
As systems become increasingly decentralized, workloads more ephemeral and attack surfaces more
dynamic, legacy PKI models are proving inadequate forth realities of zero-trust architect
and service-based computing. Mr. Rakesh Koshava as a software architect in the field
cybersecurity with over 17 years of industry experience, is a fellow of the institution
of electronics and telecommunication engineers, IETE, full member of Sigma Shee, a senior member
of IEE, an IEE Day 2025 ambassador, and currently serves as chair of the ACM-Fremont chapter,
fosters collaboration and knowledge sharing among professionals, researchers, and students in the
Bay Area. He is the Namedinventor on multiple U.S. patents in the areas of cryptography,
identity-centric security, and automated key lifecycle management, with his work cited extensively
by leading global technology firms. His professional journey reflects a strong balance of research
excellence and practical industry impact across enterprise security, cloud systems, and eye-driven
security solutions. He believes the future of digital trust. He believes the future of digital trust.
lies in modernizing public key infrastructure, PKI, to align with the velocity, granularity,
and dynamic risk profiles of today's systems.
He advocates that PQI must evolve to become agile, automated, and context-aware, capable of
supporting hybrid cloud, zero-trust architectures, and distributed digital ecosystems.
Rakesh emphasizes that PQI should not only protect static assets but also dynamically secure
ephemeral identities, workloads, and agent-to-agent communication across.
modern environments. His vision places P.K.I at the center of digital trust, ensuring it matches
the complexity and pace of the systems it is meant to secure. The breaking point of traditional
PQI, traditional PQI was never designed to operate in a world where workloads are created,
scaled, and destroyed in minutes, says Mr. Rakesh. The old approach of issuing long-lived certificates
manually and storing them in static locations simply cannot support today's infrastructure.
A clear sign of this shift is the reduced certificate validity enforced by major browser vendors.
Public TLS certificates, once valid for up to five years, are now capped at 398 days, with growing
pressure to go shorter. This trend reflects a broader industry realization, short-lived
credentials reduce the risk of compromise and make automated rotation and necessity. For internal
PKI, the shift is even more dramatic. Organizations are experimenting with certificates that expire
in 24 hours or even less. This approach strengthens security posture but creates an operational
challenge. Legacy PKI systems can't handle the volume or velocity of issuance and renewal at this
scale. Zero trust starts with identity and PKI delivers IT Zero Trust as a model, demands continuous
verification of identity, regardless of location, network, or assumed privilege. That means every
user, device, application, and service must prove its authenticity at every point of
interaction. PKK is the engine behind that proof, Mr. Rakesh explains. It enables secure,
cryptographically verifiable identity for both human and machine actors. Budenly if it's designed to
work dynamically, in a zero-trust context, trust isn't established by being, inside the firewall,
or on a certain subnet. It's established by cryptographically asserting identity and that's
precisely what a certificate does when issued based on real-time policy and usage context.
What defines a modern PKK MR? Rakesh outlines several characteristics that differentiate
modern PKK from its legacy counterparts. Ephemeral by design, certificates must have short
validity ranging from a few hours to a day requiring regular rotation. This reduces exposure
and enforces re-verification. Policy-driven automation, issuance, renewal, and revocation processes should be
fully automated and controlled by business and security policies, not manual intervention or
static configuration. Identity-bound credentials. Certificates should not rely on network metadata
like IPs or DNS names. Instead, they should be bound to trusted identity claims such as workload
roles, verified service accounts, or authenticated users. Observability and auditability. Certificate
activity must be logged, monitored, and auditable in real time especially for high sensitivity
systems. Cross-domain scalability. PQI should seamlessly support distributed workloads across
multiple data centers, cloud environments, and regions without single points of failure.
Cryptographic agility. The infrastructure must support future proof cryptography, including
a transition path to post-quantum algorithms without needing full redesigns. Where modern PQI adds
value beyond public web services, modern PQI is now a strategic asset in securing internal systems.
Its use cases include secure communication between services over encrypted channels with mutual
certificate validation, validating internal API calls using signed certificates rather than static
tokens, ensuring authenticity of software releases and internal configuration files, establishing
encrypted tunnels between regions or isolated environments, issuing certificates to developers
or administrators for privileged access automated and role aware. In all these cases,
Mr. Rakesh notes, certificates serve as digital passports that can prove, securely and independently,
who or what a system is. But for that to work reliably, the issuance and trust process must be
fast, contextual, and revocable. Why short-lived certificates should be the default one of Mr.
Rakesh's strongest recommendations is to adopt short-lived certificates across internal systems.
Instead of rotating secrets manually or relying on long-term trust, short-term credentials force
revalidation, enforce hygiene, and support dynamic scaling. If a certificate only lasts
12 hours, you don't need to worry about revocation lists or expired keys hanging around for
months, he says. Short-lived certs reset the trust boundary continually and that aligns with the
realities of modern operations. He advises starting with seven-day lifespans and gradually moving
toward daily orov and hourly expirations, combined with policy-based auto renewal and
enforcement. A visual roadmap showing PKI's evolution from long-lived certificates to short-lived
automation and fully modernized Agile Trust. The diagram above captures the strategic progression
of PKI from its traditional routes to a modern, dynamic trust framework suited for today's
security landscape. On the left, we see the classic PKI model, where certificates air long-lived,
manually issued, and bound to static systems like servers or host names. This model assumes a stable
environment and low issuance frequency which no longer hold true in distributed systems. In the center,
the modern PKI stage introduces short-lived certificates and automated renewal, shifting trust
from static assets to real-time identity verification. This leads to the final phase, PQI modernization,
where trust decisions airfully integrated with system life cycles, security policies, and cryptographic
agility. At this stage PQI becomes context-aware, as credentials are tied to workload role.
roles, service accounts, and authenticated identities rather than static IPs or DNS names.
It is auditable and observable, with certificate activity continuously monitored in real-time.
It is scalable across clouds and regions, avoiding single points of failure while supporting
hybrid and multi-cloud environments.
It is also cryptographically agile, designed to transition seamlessly to stronger and post-Quant
algorithms without disruption.
In this state, certificate management is no longer a background test.
task but an integral part of the security fabric. It lays the foundation for zero trust by ensuring
that every connection, request or process can be cryptographically verified on demand. Common pitfalls
in PKI modernization despite the urgency, many organizations fall into predictable traps when
attempting to modernize their PKI systems. Mr. Rakesh outlines four of the most common and how
to avoid them, treating PKI as a one-time deployment. Many teams install a CA and assume the job is done.
But PKI is not static. It must evolve continuously policies updated, keys rotated,
issuance volumes monitored, and vulnerabilities mitigated.
Neglecting integration with system life cycles, certificates should be issued and revoked in tandem
with the systems they secure. If a certificate outlives the system it was issued to, it becomes a
risk. Integration with provisioning and decommissioning processes is critical.
Lack of proactive revocation strategy. Revocation is often misunderstood or
delayed. Without automation and proper observability, expired or misused certificates may go undetected
especially in internal environments. Hard coding cryptographic algorithms. Building systems around
fixed primitives like RSA 2048 or SHA-1 leads to rigidity and risk. Modern PKI must support
crypto agility, allowing smooth transitions to stronger or quantum-resistant algorithms as standards evolve.
Crypto standards don't change often, Mr. Rakesh says, but when
When they do, the cost of inflexibility is enormous.
Designing with agility from the start is the only safe path forward.
A practical path to modern PKIMR.
Rakesh emphasizes that modernization doesn't need to be overwhelming especially if done in phases.
1.
Inventory existing certificate usage across internal systems, workflows, and APIs.
2.
Shorten certificate lifespans gradually and implement auto-renewal processes that don't rely on manual intervention.
3. Tie issuance to identity and role-based policies, ensuring credentials are only issued to
authorized actors. 4. Monitor and audit all certificate activity, including failed requests,
unusual usage patterns, and renewals. 5. Plan for crypto agility and post-quant migration,
even if just in test environments, to future-proof your infrastructure. PKI is not just a
back-end utility or compliance checkbox. It's a core enabler of trust in today's digital ecosystem.
As businesses adopt zero trust, accelerate digital transformation, and secure increasingly complex systems,
modernizing PKK is no longer optional, it's foundational.
Trust in 2025 and beyond will depend on systems that can prove who they are, what they're
allowed to do, and whether they're doing it securely, Mr. Rakesh concludes.
Modern PQI is how we enable that trust at scale, in real time, and with confidence in the future.
The views and opinions expressed in this article are solely my own and do not know.
necessarily reflect those of any affiliated organizations or entities. Thank you for listening to
this Hackernoon story, read by artificial intelligence. Visit hackernoon.com to read,
write, learn and publish.