Podcast
Root Causes 533: Flexibility Through Multi-CA Trust Models


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 7, 2025
We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.
Podcast Transcript
Lightly edited for flow and brevity.
Eventually getting rung out for good reasons. I think, Tim, nobody, but nobody is doing a good enough job mapping out their PKI as a whole, and how corporate structures, how they are dynamic, and how your PKI architecture is either fragile because of it, or non-fragile because of it. So in other words, let's say two companies come together, or a business division is split out, this is quite common. And yet, we see a lot of PKI architectures where multi-purpose roots - -
I'm going to sell this business. I'm going to sell a bunch of functions. There's literally going to be operating infrastructure. There's going to be code that's running, and it's got a bunch of certs that came out of the same pool as stuff that belongs to the parent company that didn't carve it off, and we might not even know which is which.
This really is guys, people who are involved, even at, like, a higher business level, who are thinking about business synergies when things are pulled apart or brought together, M & A or otherwise, a lot of times they don't think about the underlying systems that are sometimes built at an atomic level. Like a multi-purpose route. I think that it's time to get mature as corporate entities to realize that this is why you do two things. You make sure that your purposes of your PKI are at an atomic level.
Single purpose routes. And taking inventory of cryptographic assets. Because if you don't do those two things, refer to the podcast we just recorded on those and we're gonna be publishing soon, you will end up having to do PKI archeology.
Two businesses were brought together. It made sense at the time from a business standpoint, and the people who were in the trenches were like, make it work. So they cross-signed two PKI systems that had never trusted each other before. It’s now six years later. Oh, we got to sell these things. That business unit didn't work out. Or it worked out so well that we want to sell now at the peak of its value.
We're just sitting here on these Earth couches. We've got multitudes now, of reasons. I would say this. As part of your inventory taking - remember, it was where are the certificates themselves? Where are the other key materials that might not even be certificates.
What are the crown jewel secrets that are encrypted potentially or signed with these key material. And then, my God, if you don't have a map of your trust model, you're going to have to do PKI archeology at a point that you don't want to. Therefore, as part of your inventory, and this is what this podcast is, what I'm trying to suggest is - -
But this highlights where trust models could smack you in the head, is when you're not aware of them; you haven't mapped them out fully in your organization; you don't know where all the spaghetti strings are on your marionette; you don't want to have to map this out at the last minute. In other words, final line, PKI archeology as a panic mode exercise might be one of the most painful things you could ever do. So don't ever become a PKI archeologist.

