Incident Avoidance

The Silence Before
Production Breaks.

Certificates don't just expire. They break silently. cert9 transforms that uncomfortable uncertainty into an operational truth you can act on before PagerDuty fires.

risk.log
Risk Score:72 HIGH RISK
10:42:15
RENEWAL_STALLEDEXPIRY < 24H
api.example.com
Renewal exceeded 3-day safety window.
> Owner: @platform-sre
10:41:02
ISSUER_RATE_LIMIT
letsencrypt-prod-issuer
52 retry failures in last 24h
4 renewals pending
in 7h:55m
IMPACT
Public API traffic will fail TLS handshake
Ingress: api-gateway
Cluster: us-east-1
The Operational Gap

ACME Automates Issuance.
It Doesn't Manage Lifecycle.

ACME issues certificates. It does not verify they remain healthy, correctly deployed, and safe in production.

Standard ACME Client

Stops at successful issuance.

  • Writes TLS Secret
  • Assumes Ingress / Gateway reload succeeds
  • Retries failed challenges
  • Marks order as complete
Operational Truth

cert9 Operational Layer

Verifies what happens after issuance.

  • Confirms Secret is actively bound to workloads
  • Validates Ingress / Gateway configuration matches certificate
  • Monitors issuer health and challenge failures
  • Detects stalled or rate-limited renewals
  • Maps real-time blast radius across services

If a DNS-01 challenge stalls or an issuer hits rate limits, cert9 detects the failure before expiration impacts production.

There is a gap between "Certificate Issued" and "Traffic Secure."
cert9 operates in that gap.

The Blast Radius.

Don't guess based on secret names. cert9 creates a live map of your TLS surface area. When a certificate is at risk, you see the full impact immediately.

Deep Inspection

We don't just scan endpoints. We introspect the cluster state, reading CRDs, Ingresses, Gateway API routes, and Service meshes.

dependency_graph: cert-prod-wildcard
CRITICAL
Affected Resources
ingress/api-gateway
ns: production
deployment/payment-svc
ns: payments
istio/virtual-service
ns: mesh-system
cronjob/daily-report
ns: data-ops

ingress/api-gateway

nginx-ingressuid: 8a7f9c2d...
EXPIRES 48H
Issued by: Let's Encrypt
Public DNS
api.example.com
Traffic Volume
~450 req/sec
TLS Termination
Secret: production/wildcard-tls
SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
# Ingress Configuration
spec:
  tls:
  - hosts:
    - api.example.com
    secretName: wildcard-tls <-- Expiring Source
  rules:
  - host: api.example.com
    http:
      paths: ...

Not Just Public Certificate Scanning.

External scanners only see what you expose to the internet. They miss 80% of your risk: internal mTLS, sidecars, database connections, and private gateways.

cert9 sits inside your infrastructure. We see the secrets, the config maps, and the bound services that public scanners can't reach.

Visibility Comparison
Target
Public Scanner
cert9
Public Ingress
DETECTED
DETECTED
Internal APIs
MISSED
DETECTED
Cluster mTLS
MISSED
DETECTED
Private Gateways
MISSED
DETECTED

Operational Truth.

Stop relying on spreadsheets and manual checks. Get uncomfortable awareness.

Total Inventory

No more "I didn't know we had that." Auto-discovery across every cluster, namespace, and bare-metal server. If it has a private key, we find it.

K8sNginxApacheIstio

Impact Analysis

Map certificates to the actual services they break. We correlate the secret to the ingress, the ingress to the service, and the service to the alert.

Pipeline Health

ACME isn't fire-and-forget. We monitor the issuer health, rate limits, and challenge failures. Know why it's failing before the retry backoff hits max.

Pre-Incident Alerting

Get alerted when the configuration drifts, not just when the timer runs out. Catch the misconfiguration 5 minutes after deploy, not 5 minutes before expiry.

Install Anywhere

Lightweight agents. No sidecars. Instant visibility.

Kubernetes

helm repo add cert9 https://charts.cert9.com
helm install cert9-agent cert9/agent \
--set apiKey=$API_KEY

Works with AWS EKS, Google GKE, Azure AKS, etc

Bare Metal

Beta
curl -sfL https://get.cert9.com | bash -s -- \
--token $API_KEY

Single binary. Zero dependencies. For Ubuntu and RHEL.

Enterprise Visibility. Without Enterprise Pricing.

Aligns with your PKI footprint, not your machine count.

MonthlyYearlySave 10%

Free Trial

Perfect for POCs and testing.

Free21 Days
  • Unlimited Features
  • Community Support
  • No Credit Card Required
Recommended

Pro

Save $72/year

Complete visibility for growing teams.

$63/month

Billed annually ($756/year)

Plan Your Growth
50012502000+
500 certificates (MCI)
  • Unlimited Clusters and Machines
  • Unlimited Domains
  • Full Dependency Mapping
  • Slack & PagerDuty Alerts
  • Digests & Reporting
No credit card required.

Enterprise

Security, compliance, and scale.

Custom
  • Unlimited certificates and domains
  • Priority Support & SLA
  • SSO (SAML/OIDC)
  • Dedicated Account Team
MCI (Managed Certificate Instance): One certificate on one machine = 1 MCI. Fair pricing for modern infra.

Ready to see the truth?

Deploy the agent in under 2 minutes. See your risks immediately.

Waiting for input...