Baxter International · Feb 2024 – Present
Production-ready PKI infrastructure enabling automated certificate issuance and rotation across internal microservices
In enterprise healthcare environments, managing digital certificates for thousands of microservices is a critical security challenge. Manual certificate issuance and rotation doesn't scale and creates security vulnerabilities when certificates expire unexpectedly.
At Baxter International, I led the end-to-end development of a production-ready EST (Enrollment over Secure Transport) certificate management service that automates the entire certificate lifecycle—from issuance to rotation—across our internal microservices infrastructure.
EST (RFC 7030) is a protocol for automated certificate enrollment and renewal. Think of it as "ACME for internal enterprise PKI"—it provides a standardized way for services to:
Unlike public ACME (used by Let's Encrypt), EST is designed for enterprise internal PKI where you control both the certificate authority and the clients.
The service consists of several key components:
Security was paramount. The service implements defense-in-depth:
The service runs on Kubernetes with:
When should certificates be renewed? Too early wastes resources. Too late risks expiration.
Solution: Implemented adaptive renewal scheduling. Certificates are renewed at 2/3 of their lifetime by default, with exponential backoff retry logic if renewal fails. Critical services get prioritized renewal slots.
Healthcare environments require comprehensive audit trails. Every certificate operation must be logged with:
Solution: Built comprehensive audit logging system with structured logs forwarded to centralized SIEM. All operations are tracked with correlation IDs for debugging.
How do you rotate a certificate for a running service without downtime?
Solution: Implemented dual-certificate overlap period. Services request new certificates before old ones expire, run with both certificates active for an overlap window, then deprecate the old certificate. This ensures continuous operation during rotation.
The service is moving toward broader internal adoption following successful qualification with early adopter teams. Feedback has been overwhelmingly positive—teams appreciate not having to manage certificate lifecycles manually.
This project required extensive collaboration:
I acted as the technical lead, coordinating between stakeholders, making architectural decisions, and ensuring the solution met enterprise security requirements.
EST defines several endpoints. Key implementations:
/simpleenroll: New certificate requests (PKCS#10 CSR input)/simplereenroll: Certificate renewal (existing cert + new CSR)/cacerts: CA certificate retrievalEach endpoint implements strict validation:
Rather than using EST's built-in HTTP Basic Auth, we integrated OAuth2 for enterprise SSO:
Authorization header with EST requestSeveral enhancements are planned for future releases:
NOTE ON PROPRIETARY INFORMATION
This description focuses on publicly-known PKI/EST concepts and general architectural patterns. Specific implementation details, vendor names, and Baxter proprietary information are intentionally omitted.