Category
Security, identity, and compliance
1. Introduction
AWS Certificate Manager is an AWS service for provisioning, managing, and deploying TLS/SSL certificates used to encrypt network traffic and prove the identity of your applications.
In simple terms, AWS Certificate Manager helps you get HTTPS working for your AWS applications without manually generating keys, creating CSRs, paying for public certificates (for many AWS-integrated use cases), rotating certificates on a schedule, or remembering renewal deadlines.
Technically, AWS Certificate Manager (ACM) is a managed certificate lifecycle service. It issues public certificates (domain-validated) and lets you import third-party certificates. It integrates directly with several AWS services (such as Elastic Load Balancing and Amazon CloudFront) so those services can present the certificate during the TLS handshake. For DNS-validated ACM public certificates used with supported AWS services, ACM can automatically renew and deploy updated certificates before expiration.
The core problem it solves is operational and security risk caused by manual certificate management: expired cert outages, misconfigured ciphers, private key handling mistakes, and slow certificate issuance and rotation processes. In the broader Security, identity, and compliance category, ACM is one of the most practical services for reducing the attack surface and improving the reliability of encrypted endpoints.
2. What is AWS Certificate Manager?
Official purpose: AWS Certificate Manager provisions and manages SSL/TLS certificates for use with AWS services and your internal connected resources. The canonical overview is in the ACM User Guide:
https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html
Core capabilities
- Request public certificates (domain validation via DNS or email) and use them with integrated AWS services (for example, ALB, NLB TLS listeners, CloudFront, API Gateway custom domains).
- Automatically renew eligible ACM-issued public certificates when validation remains in place and the certificate is in use by supported services.
- Import certificates obtained from third-party CAs (bring-your-own certificate).
- Centralize certificate inventory per account/region and apply governance (IAM controls, tagging, auditing).
- Private certificates for internal PKI are provided via the related service AWS Certificate Manager Private Certificate Authority (ACM Private CA), which is a separate, billed service. ACM is the “management plane” where you request and store certificates; ACM Private CA provides private CA infrastructure. (See: https://aws.amazon.com/private-ca/)
Major components (conceptually)
- Certificates: public (ACM-issued), imported (third-party), and private (typically issued via ACM Private CA).
- Domain validation: DNS validation or email validation for public certificates.
- Renewal process: automatic for many DNS-validated public certs used with supported services; manual for imported certs.
- Integrations (deployment targets): services that can “attach” an ACM certificate and terminate TLS on your behalf.
Service type
- Managed security service (certificate lifecycle management).
- Not a general-purpose secret store (that’s AWS Secrets Manager), and not a key management service (that’s AWS KMS).
Scope: regional vs global
- ACM is primarily a regional service: certificates live in a specific AWS Region.
- Amazon CloudFront is a key exception in practice: CloudFront requires the ACM certificate to be in the US East (N. Virginia) Region (
us-east-1). This is one of the most common ACM “gotchas.” - API Gateway has different behaviors depending on endpoint type (regional vs edge-optimized). Always verify the current requirement in the relevant service docs.
How it fits into the AWS ecosystem
ACM sits at the boundary between:
– Identity (server identity via certificates): proving your endpoint is api.example.com.
– Transport security (TLS): encrypting data in transit.
– Service integrations: pushing certificate usage down into managed services so private keys aren’t handled by your app teams.
It is frequently used together with: – Amazon Route 53 (DNS validation and DNS hosting) – Elastic Load Balancing (ALB/NLB TLS termination) – Amazon CloudFront (HTTPS at the edge) – Amazon API Gateway (custom domains) – AWS WAF / AWS Shield (edge protections typically paired with CloudFront) – AWS Config / AWS Security Hub (governance and compliance visibility, depending on your setup)
3. Why use AWS Certificate Manager?
Business reasons
- Reduce outage risk from certificate expiration with managed renewal.
- Lower operational overhead: fewer manual tasks for security and platform teams.
- Faster delivery: teams can enable HTTPS quickly during launches or migrations.
Technical reasons
- Tight integration with AWS-managed endpoints for TLS termination.
- Standardized TLS posture by centralizing certificate inventory and minimizing ad-hoc certificate handling.
- Support for SANs and wildcards (subject to service limits; verify current limits in official docs).
Operational reasons
- Automation-friendly: request/describe/tag certificates via console, CLI, SDK, and infrastructure-as-code.
- Event-driven operations: integrate certificate lifecycle alerts with Amazon EventBridge (for example, impending expiration for imported certs).
Security/compliance reasons
- Private key protection: for ACM-issued public certificates, private keys are managed by AWS and not exposed for export in typical ACM public certificate flows.
- Auditability: CloudTrail logs certificate management API calls.
- Encryption in transit becomes the default for user traffic, API traffic, and service-to-service communication (when combined with other components such as mTLS patterns).
Scalability/performance reasons
- At scale, TLS termination is handled by managed edge/load balancer layers rather than individual instances, reducing per-instance CPU overhead and simplifying horizontal scaling.
When teams should choose AWS Certificate Manager
- You’re using ALB/NLB, CloudFront, or API Gateway and want a managed certificate lifecycle.
- You want to standardize public certificate issuance and renewals with minimal manual steps.
- You need a clean separation between app teams and certificate/private key handling.
When teams should not choose AWS Certificate Manager
- You must export public certificates’ private keys for use on non-AWS infrastructure (ACM-issued public certs are designed primarily for AWS-integrated endpoints). In such cases:
- Use a third-party CA and import into ACM for supported AWS endpoints, and separately deploy to non-AWS endpoints, or
- Use another CA tooling approach appropriate for your environment.
- You need full control of CA hierarchy and issuance policies for internal identities: consider ACM Private CA, HashiCorp Vault PKI, or an enterprise PKI.
- You need certificates for device identity in AWS IoT Core: AWS IoT uses its own certificate workflows; don’t assume ACM is the right tool.
4. Where is AWS Certificate Manager used?
Industries
- SaaS and technology platforms (HTTPS everywhere, many domains)
- Financial services (compliance-driven encryption, strong governance)
- Healthcare (data-in-transit protections)
- E-commerce (customer-facing TLS endpoints and API gateways)
- Media/streaming (CDN + TLS for global content delivery)
Team types
- Platform engineering teams standardizing HTTPS enablement
- Security engineering teams enforcing encryption policies and auditing
- DevOps/SRE teams operating load balancers, CDNs, and gateways
- Application teams deploying microservices behind ALBs and APIs
Workloads
- Web front ends (custom domains, TLS at the edge)
- Public APIs (API Gateway custom domains)
- Multi-tenant SaaS (wildcards + SANs; verify limits and design carefully)
- Internal services (with private certificates via ACM Private CA)
- Hybrid workloads where AWS endpoints must be trusted by on-prem clients
Architectures
- CloudFront + S3 or CloudFront + ALB origin
- ALB + Auto Scaling groups / ECS / EKS services
- API Gateway + Lambda or HTTP backends
- Multi-account landing zones with centralized governance
Real-world deployment contexts
- Production: automated DNS validation + managed renewal + governance controls
- Dev/test: short-lived domains/environments; imported certs are less ideal due to renewal overhead
5. Top Use Cases and Scenarios
Below are realistic scenarios where AWS Certificate Manager is commonly used.
1) HTTPS for CloudFront custom domain
- Problem: You need
www.example.comon a CloudFront distribution with HTTPS. - Why ACM fits: CloudFront integrates directly with ACM; ACM can issue a public cert and manage renewals.
- Example: Marketing site hosted in S3, delivered via CloudFront with an ACM certificate in
us-east-1.
2) TLS termination on an Application Load Balancer (ALB)
- Problem: You run services on ECS/EKS/EC2 and need HTTPS without managing cert files on instances.
- Why ACM fits: ALB can use ACM certificates on HTTPS listeners.
- Example: A microservices cluster behind an ALB uses ACM certs for
api.example.com.
3) TLS on a Network Load Balancer (NLB) with TLS listeners
- Problem: You need L4 load balancing with TLS termination or passthrough patterns.
- Why ACM fits: NLB supports TLS listeners that can use ACM certificates.
- Example: A high-throughput ingestion service uses NLB TLS listeners with ACM certs.
4) API Gateway custom domain for public APIs
- Problem: You want
api.example.cominstead of the default execute-api hostname. - Why ACM fits: API Gateway custom domains integrate with ACM.
- Example: Public REST/HTTP API with usage plans, WAF, and an ACM certificate.
5) Central inventory of certificates (governance)
- Problem: Certificates are scattered across teams and accounts with inconsistent naming and no ownership tags.
- Why ACM fits: ACM provides centralized listing per region with tagging and IAM controls.
- Example: A platform team enforces tags like
Owner,Environment,Application.
6) Replace manual renewal processes
- Problem: Teams renew certs manually, causing near-expiration incidents.
- Why ACM fits: For eligible ACM public certs, renewal is automatic when DNS validation remains.
- Example: An org migrates all ALB HTTPS listeners to ACM-issued certs and sets EventBridge alerts for imported certs only.
7) Blue/green domain migrations with SAN certificates
- Problem: You’re migrating from
old.example.comtonew.example.comand need overlap. - Why ACM fits: One certificate can cover multiple SANs (subject to limits).
- Example: A single cert covers both domains during a phased migration.
8) Wildcard certificate for many subdomains (carefully governed)
- Problem: You need TLS for many ephemeral subdomains (e.g., preview environments).
- Why ACM fits: Wildcard certificates can reduce issuance overhead (subject to policy and limits).
- Example:
*.preview.example.comused for short-lived environments behind an ALB.
9) Import enterprise CA certificates for legacy requirements
- Problem: Your enterprise mandates a specific public CA/vendor or special certificate attributes.
- Why ACM fits: ACM supports importing third-party certificates for AWS-integrated endpoints.
- Example: Import a DigiCert certificate used on an ALB while maintaining enterprise CA contracts.
10) Internal TLS with private PKI (via ACM Private CA)
- Problem: You need internal service identities, mTLS, or internal-only domains not publicly resolvable.
- Why ACM fits: ACM integrates with ACM Private CA for private issuance and lifecycle.
- Example: Internal
serviceA.corp.localcertificates issued by ACM Private CA and deployed to internal endpoints (verify compatible targets and export requirements).
11) Compliance-driven TLS everywhere initiative
- Problem: Audit requires encryption in transit across all externally exposed endpoints.
- Why ACM fits: Simplifies issuing and tracking certs across many endpoints.
- Example: A compliance program tracks all internet-facing endpoints and ensures each uses ACM-managed TLS.
12) Rapid domain onboarding for multi-brand organizations
- Problem: Many brand domains must be launched quickly and safely.
- Why ACM fits: DNS validation scales well when using Route 53; renewals are automated.
- Example: A media company rolls out dozens of branded microsites via CloudFront + ACM.
6. Core Features
1) Public certificate issuance (ACM-issued)
- What it does: Issues domain-validated public TLS certificates.
- Why it matters: Eliminates external CA procurement for many AWS endpoint scenarios.
- Practical benefit: Faster HTTPS enablement; fewer manual steps.
- Limitations/caveats: Public certificates are domain-validated (not organization-validated/EV through ACM). ACM-issued public certs are primarily intended for use with supported AWS services, and public cert private keys are generally not exportable. Verify current export capabilities in official docs if your use case requires it.
2) Domain validation: DNS validation
- What it does: Proves domain control by creating DNS records (CNAME) as instructed by ACM.
- Why it matters: DNS validation can be automated and supports automatic renewal.
- Practical benefit: “Set and forget” renewal when DNS record remains.
- Limitations/caveats: You must keep validation records in DNS. Removing them can break renewal.
3) Domain validation: email validation
- What it does: Proves domain control via approval emails sent to common admin addresses or WHOIS contacts (behavior depends on TLD/domain).
- Why it matters: Useful when you can’t update DNS easily.
- Practical benefit: Can work in constrained DNS environments.
- Limitations/caveats: Operationally fragile; renewals may require repeated human approval. DNS is typically preferred.
4) Automatic renewal (for eligible ACM-issued public certs)
- What it does: Renews certificates before expiration and deploys them to integrated services automatically.
- Why it matters: Prevents certificate-expiration outages.
- Practical benefit: Reduces pager noise and scheduled maintenance.
- Limitations/caveats: Renewal depends on continued validation and usage with supported services. Imported certificates do not auto-renew.
5) Certificate deployment to integrated AWS services
- What it does: Lets services like ALB/CloudFront/API Gateway use ACM certificates directly.
- Why it matters: Reduces private key distribution and server-side configuration.
- Practical benefit: No certificate files on instances/containers for TLS termination.
- Limitations/caveats: Not every AWS service integrates. Confirm each target service’s requirements and region constraints.
6) Import third-party certificates
- What it does: Store and deploy certificates you obtain elsewhere.
- Why it matters: Supports enterprise CA policies, special cert types, or existing vendor contracts.
- Practical benefit: Use one management surface for both ACM and external certs.
- Limitations/caveats: You must track and re-import renewals yourself; ACM does not renew imported certs.
7) Tagging and resource organization
- What it does: Add tags to certificates for ownership, environment, application, and cost allocation.
- Why it matters: Enables governance in large environments.
- Practical benefit: Faster auditing and clearer responsibility.
- Limitations/caveats: Tagging discipline must be enforced via policy (SCPs, IAM, CI checks).
8) IAM access control
- What it does: Use IAM policies to control who can request, import, delete, or describe certificates.
- Why it matters: Certificate mismanagement can cause outages or security incidents.
- Practical benefit: Enforces least privilege and separation of duties.
- Limitations/caveats: Overly restrictive policies can block renewals/operations. Test governance changes.
9) Auditing with AWS CloudTrail
- What it does: Logs ACM API actions (request, import, delete, tag, etc.).
- Why it matters: Supports incident response and compliance evidence.
- Practical benefit: Clear traceability of changes.
- Limitations/caveats: CloudTrail must be enabled and centrally aggregated in serious environments.
10) Expiration monitoring hooks (EventBridge / AWS Config)
- What it does: Integrate expiration checks and compliance rules for certificate hygiene.
- Why it matters: Imported certs and non-integrated certs still need monitoring.
- Practical benefit: Alerting and compliance reporting.
- Limitations/caveats: Event types and rule behavior can differ across services—verify current implementations.
7. Architecture and How It Works
High-level architecture
ACM sits in the control plane: 1. You request or import a certificate in a region. 2. You validate domain control (DNS/email). 3. You attach the certificate to an integrated service (CloudFront, ALB, API Gateway, etc.). 4. During client connections, the integrated service presents the certificate and negotiates TLS. 5. Before expiration, ACM may renew and rotate the certificate automatically (for eligible ACM-issued public certs).
Request / data / control flows
- Control plane calls:
RequestCertificate,DescribeCertificate,ImportCertificate,AddTagsToCertificate,DeleteCertificate. - Validation flow:
- DNS validation: you create a CNAME record; ACM periodically checks it.
- Email validation: an approver clicks a link in an email.
- Runtime data plane: TLS handshakes occur between clients and the integrated service (not ACM directly).
Integrations with related services (common)
- Amazon Route 53: host DNS zones; place validation records; create alias records to CloudFront/ALB/API.
- Elastic Load Balancing (ALB/NLB): attach ACM certs to TLS/HTTPS listeners.
- Amazon CloudFront: use ACM certs in
us-east-1for custom domains. - Amazon API Gateway: custom domain names mapped to APIs using ACM certs.
- AWS WAF / Shield: typically placed in front of or attached to CloudFront/ALB to protect HTTPS endpoints.
- AWS CloudTrail: auditing.
- AWS Config: compliance checks (for example, expiration checks).
- Service Quotas: manage ACM limits per account/region.
Dependency services
- A DNS provider (often Route 53) is effectively a dependency for DNS validation automation.
- The target service (CloudFront/ALB/API Gateway) is a dependency if you want managed deployment and renewal with minimal operations.
Security/authentication model
- IAM governs who can manage certificates.
- Integrated services are allowed to use certificates you select/attach (through service integration mechanics).
- For ACM-issued public certificates used with supported services, the private key is protected and generally not exposed.
Networking model
- ACM itself is a managed AWS service; you access it via AWS APIs.
- Your certificate is used by edge/load-balancing services in the network data path.
Monitoring/logging/governance considerations
- CloudTrail: central log of certificate management actions.
- EventBridge: automation and alerts (for example, when imported certs near expiration).
- AWS Config: ongoing compliance evaluation of certificate expiration posture.
- Tagging: enforce ownership and lifecycle responsibility.
Simple architecture diagram (Mermaid)
flowchart LR
User((User Browser))
R53[Amazon Route 53]
CF[Amazon CloudFront]
S3[(Amazon S3 Origin)]
ACM[AWS Certificate Manager<br/>(us-east-1 cert)]
User -->|HTTPS request| CF
CF -->|Origin fetch| S3
R53 -->|Alias A/AAAA| CF
ACM -->|Certificate attached| CF
Production-style architecture diagram (Mermaid)
flowchart TB
subgraph Internet
U1((Users))
end
subgraph Edge
CF[Amazon CloudFront]
WAF[AWS WAF]
Shield[AWS Shield<br/>(if enabled)]
end
subgraph DNS
R53[Amazon Route 53 Hosted Zone]
end
subgraph RegionA["AWS Region A"]
ALB[Application Load Balancer<br/>HTTPS listener]
ECS[ECS/EKS/EC2 Services]
ACM_REG[AWS Certificate Manager<br/>(Regional cert)]
end
subgraph ACMGlobal["ACM in us-east-1 (for CloudFront)"]
ACM_EDGE[AWS Certificate Manager<br/>(Edge cert)]
end
subgraph Observability
CT[CloudTrail]
EB[Amazon EventBridge]
CFG[AWS Config]
end
U1 -->|HTTPS| CF
CF --> WAF --> ALB
Shield -. protection .- CF
R53 -->|Alias to CloudFront| CF
ACM_EDGE -->|TLS cert for CloudFront| CF
ACM_REG -->|TLS cert for ALB (optional if CF->ALB is HTTPS)| ALB
ALB --> ECS
CT --- ACM_EDGE
CT --- ACM_REG
EB --- ACM_EDGE
CFG --- ACM_EDGE
8. Prerequisites
AWS account requirements
- An active AWS account with billing enabled.
- Ability to create/manage DNS records for a domain you control.
Permissions / IAM
Minimum practical permissions (recommend least privilege; adjust for your environment):
– acm:RequestCertificate
– acm:DescribeCertificate
– acm:ListCertificates
– acm:AddTagsToCertificate
– acm:DeleteCertificate
– Route 53 permissions if automating DNS validation:
– route53:ListHostedZones
– route53:ChangeResourceRecordSets
– Permissions for CloudFront/S3 if doing the lab:
– cloudfront:CreateDistribution, cloudfront:GetDistribution, cloudfront:UpdateDistribution, cloudfront:DeleteDistribution
– s3:CreateBucket, s3:PutObject, s3:PutBucketPolicy, s3:DeleteBucket, s3:DeleteObject
In enterprises, you may need additional permissions via IAM roles and change processes.
Billing requirements
- ACM public certificates are commonly offered at no additional charge when used with supported AWS services, but you still pay for the services that use them (CloudFront, ALB, Route 53, etc.). Confirm current pricing details: https://aws.amazon.com/certificate-manager/pricing/
- ACM Private CA is a separate paid service: https://aws.amazon.com/private-ca/pricing/
CLI / tools
Optional but recommended:
– AWS CLI v2: https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html
– Configured credentials: aws configure (or SSO)
Region availability
- ACM is available in many AWS Regions, but not necessarily all partitions/regions. Verify in the AWS Regional Services List and ACM docs.
- For CloudFront, you must request/import the certificate in
us-east-1.
Quotas / limits
- ACM has quotas such as number of certificates per region and request rates.
- Use Service Quotas to view current limits for your account and region. Do not rely on static numbers; they can change.
Prerequisite services for this tutorial
- A registered domain name.
- A public hosted zone in Amazon Route 53 (recommended for easy DNS validation).
- Amazon S3 and Amazon CloudFront (for the hands-on lab).
9. Pricing / Cost
Always validate pricing in the official AWS pricing pages (pricing varies by region and changes over time): – ACM pricing: https://aws.amazon.com/certificate-manager/pricing/ – ACM Private CA pricing: https://aws.amazon.com/private-ca/pricing/ – AWS Pricing Calculator: https://calculator.aws/
Pricing dimensions (what you actually pay for)
For AWS Certificate Manager (public certificates): – Public ACM-issued certificates are typically priced at no additional cost. – You pay for the integrated services that use the certificates, such as: – CloudFront data transfer and requests – Load balancer hourly and LCU usage (ALB) or NLB charges – Route 53 hosted zone and DNS queries – API Gateway requests and custom domain features
For AWS Certificate Manager Private Certificate Authority (separate service): – You pay for the private CA itself and for issued certificates based on the ACM Private CA pricing model. (Do not assume it is free.)
For imported certificates: – Importing into ACM does not generally add a separate certificate fee, but the same integrated services costs apply.
Free tier
- AWS may have free tier offers for CloudFront, S3, and Route 53 for new accounts, but do not assume. Check your account’s current free tier status and the pricing pages.
Cost drivers
Direct and indirect cost drivers include: – CloudFront: requests, data transfer out, and any optional features you enable. – Route 53: hosted zone monthly fee, DNS query volume, health checks (if used). – ALB/NLB: hourly charges and usage units (ALB LCUs or NLB metrics). – Operational tooling: CloudTrail data events (if enabled), centralized logging, Config evaluations.
Hidden or indirect costs
- Domain registration (Route 53 or elsewhere).
- Multi-region duplication: if you deploy ALBs in multiple regions, you may need separate ACM certificates per region.
- Environment sprawl: preview environments can multiply CloudFront distributions/ALBs and DNS records.
Network/data transfer implications
- ACM itself is not typically a data plane cost driver.
- The big cost is encrypted traffic volume through CloudFront/ALB/API Gateway and the downstream origin traffic.
How to optimize cost
- Use CloudFront caching for static or cacheable content to reduce origin load and data transfer.
- Consolidate domains where appropriate using SANs/wildcards (balanced with security and blast-radius concerns).
- Use Route 53 records efficiently (avoid unnecessary high-frequency DNS queries where possible).
- Delete unused distributions, load balancers, and validation records when environments are retired.
Example low-cost starter estimate (conceptual)
A minimal learning setup might include: – 1 ACM public certificate (often no additional charge) – 1 small S3 bucket with a tiny static file – 1 CloudFront distribution with low request volume – 1 Route 53 hosted zone and a few DNS queries
Your bill is likely dominated by Route 53 hosted zone + CloudFront requests/data transfer, even at low scale. Use the AWS Pricing Calculator for your region and expected traffic.
Example production cost considerations
In production, cost planning should include: – Multiple CloudFront distributions for different domains/brands – Higher data transfer out and request volume – WAF costs (if attached) – Multi-region ALBs and APIs – Governance tooling (Config rules at scale, logging retention)
10. Step-by-Step Hands-On Tutorial
Objective
Request an ACM public certificate, validate it using Route 53 DNS validation, and use it to enable HTTPS on a CloudFront distribution serving a static website from a private S3 bucket.
Lab Overview
You will:
1. Confirm your domain is hosted in Route 53.
2. Request an ACM certificate in us-east-1 for www.<your-domain>.
3. Add the DNS validation record in Route 53 and wait for issuance.
4. Create a private S3 bucket with a simple index.html.
5. Create a CloudFront distribution using the ACM certificate.
6. Point www.<your-domain> to CloudFront via Route 53 alias.
7. Validate HTTPS works.
8. Clean up resources to avoid ongoing charges.
Expected outcome: Visiting https://www.<your-domain> returns your static page and shows a valid TLS certificate.
Cost note
ACM public certificates are typically no additional charge, but CloudFront and Route 53 are not free in general. Clean up resources when done.
Step 1: Prepare prerequisites (domain + Route 53 hosted zone)
- In the AWS Console, open Route 53 → Hosted zones.
- Confirm you have a public hosted zone for your domain, e.g.,
example.com. - Ensure you can create records in that zone.
Expected outcome: You can see your hosted zone and have permission to change DNS records.
CLI verification (optional):
aws route53 list-hosted-zones
Step 2: Request an ACM public certificate in us-east-1
CloudFront requires the certificate in us-east-1.
Option A (Console)
- Switch AWS Console region to US East (N. Virginia) us-east-1.
- Open AWS Certificate Manager → Request a certificate.
- Choose Request a public certificate.
- Add domain names:
–
www.example.com(replace with yours) – Optionally alsoexample.comif you want the apex domain later - Choose DNS validation (recommended).
- (Optional) Add tags like:
–
Application=static-site–Environment=lab–Owner=<your-email-or-team> - Request the certificate.
Option B (AWS CLI)
aws acm request-certificate \
--region us-east-1 \
--domain-name www.example.com \
--validation-method DNS \
--tags Key=Application,Value=static-site Key=Environment,Value=lab
Capture the returned CertificateArn.
Expected outcome: A certificate request exists in ACM with status like Pending validation.
Check status:
aws acm describe-certificate \
--region us-east-1 \
--certificate-arn "arn:aws:acm:us-east-1:123456789012:certificate/..." \
--query "Certificate.Status"
Step 3: Create the DNS validation record in Route 53
ACM provides a DNS CNAME record you must add to your domain’s DNS.
Console method (recommended if hosted zone is in Route 53)
- In ACM, open the certificate details.
- Under Domains, choose Create records in Route 53 (if available).
- Confirm the hosted zone and create the record.
Manual DNS method (CLI-assisted)
Fetch the needed validation record:
aws acm describe-certificate \
--region us-east-1 \
--certificate-arn "arn:aws:acm:us-east-1:123456789012:certificate/..." \
--query "Certificate.DomainValidationOptions[0].ResourceRecord"
You’ll get something like:
– Name: _abc123.www.example.com.
– Type: CNAME
– Value: _xyz987.acm-validations.aws.
Create that CNAME in your hosted zone in Route 53.
Expected outcome: Route 53 contains the CNAME validation record.
Wait for issuance (can take minutes; sometimes longer):
aws acm wait certificate-validated \
--region us-east-1 \
--certificate-arn "arn:aws:acm:us-east-1:123456789012:certificate/..."
Then confirm:
aws acm describe-certificate \
--region us-east-1 \
--certificate-arn "arn:aws:acm:us-east-1:123456789012:certificate/..." \
--query "Certificate.Status"
You want ISSUED.
Step 4: Create a private S3 bucket and upload a test page
You will use CloudFront to access the S3 bucket; the bucket should not be public.
- Open Amazon S3 → Create bucket.
- Bucket name example:
acm-cloudfront-lab-<unique-id> - Keep Block all public access enabled.
- Create the bucket.
Upload a simple index.html:
<!doctype html>
<html>
<head><meta charset="utf-8"><title>ACM Lab</title></head>
<body>
<h1>HTTPS working via AWS Certificate Manager + CloudFront</h1>
<p>If you can read this over https://, your certificate is deployed.</p>
</body>
</html>
Expected outcome: The S3 bucket contains index.html, and the bucket is not public.
Step 5: Create a CloudFront distribution with the ACM certificate
You will:
– Set S3 as the origin
– Use Origin Access Control (OAC) (recommended modern approach) so the bucket stays private
– Attach your ACM certificate
– Set www.example.com as an Alternate Domain Name (CNAME)
Console steps
- Open Amazon CloudFront → Create distribution.
- Origin domain: select your S3 bucket (not the S3 website endpoint).
- For Origin access: – Choose Origin access control settings (recommended) – Create a new OAC if needed.
- Default cache behavior: – Viewer protocol policy: Redirect HTTP to HTTPS
- Settings:
– Alternate domain name (CNAME):
www.example.com– Custom SSL certificate: select your ACM certificate (must be in us-east-1) - Create the distribution.
CloudFront will provide:
– A distribution domain name like d123abcdef8.cloudfront.net.
Update the S3 bucket policy for OAC
CloudFront typically prompts you with a policy to copy into your bucket. Apply the generated policy in S3 → Permissions → Bucket policy.
Expected outcome: CloudFront distribution status becomes Deployed (this can take several minutes), and S3 remains private.
Step 6: Create Route 53 alias record for your custom domain
In Route 53 → Hosted zone → example.com → Create record:
– Record name: www
– Record type: A (and optionally AAAA for IPv6)
– Alias: Yes
– Route traffic to: Alias to CloudFront distribution
– Choose your distribution
Expected outcome: www.example.com resolves to CloudFront.
Verify DNS:
dig www.example.com +short
Step 7: Test HTTPS end-to-end
Once CloudFront is deployed and DNS propagated:
curl -I https://www.example.com
You should see:
– HTTP/2 200 or HTTP/2 403 depending on default root object and permissions
– A server: CloudFront header is common
– Most importantly: TLS handshake succeeds and the certificate is valid for www.example.com.
If you didn’t set a default root object, configure Default root object in CloudFront settings as index.html, then retest.
Expected outcome: Browser and curl can load the page over HTTPS without certificate warnings.
Validation
Use this checklist:
– ACM certificate status is ISSUED in us-east-1.
– CloudFront distribution is Deployed.
– Route 53 has:
– ACM DNS validation CNAME record (for issuance/renewal)
– Alias A/AAAA record pointing www to CloudFront
– https://www.example.com loads successfully and shows the expected content.
Troubleshooting
Common issues and fixes:
-
Certificate not selectable in CloudFront – Cause: certificate was created in the wrong region. – Fix: request/import the certificate in us-east-1.
-
ACM stuck on “Pending validation” – Cause: DNS validation CNAME missing or incorrect; hosted zone mismatch; record not propagated. – Fix: re-check
describe-certificateoutput; ensure record name/value match exactly and exist in the authoritative DNS zone. -
CloudFront shows 403 AccessDenied from S3 – Cause: bucket policy/OAC not configured correctly. – Fix: apply the CloudFront-provided bucket policy for OAC; ensure origin is the bucket REST endpoint, not the website endpoint.
-
CloudFront returns 404 – Cause: default root object not set; object key mismatch. – Fix: set Default root object to
index.htmland confirm the object exists. -
Browser shows certificate mismatch – Cause: CNAME mismatch; you accessed the CloudFront domain instead of your custom domain; wrong Alternate Domain Name. – Fix: ensure you browse
https://www.example.comand CloudFront distribution includes that CNAME. -
DNS resolves but site not updated – Cause: propagation or caching. – Fix: wait; lower TTL for future changes; invalidate CloudFront cache if needed (may incur cost).
Cleanup
To avoid ongoing charges, remove resources in this order:
-
Route 53 records – Delete the
wwwalias A/AAAA record pointing to CloudFront. – Keep the ACM validation CNAME record only if you plan to keep/renew the certificate; otherwise you can remove it after deleting the certificate. -
CloudFront distribution – Disable the distribution first, wait for it to deploy. – Then delete it.
-
S3 bucket – Delete objects (
index.html) and then delete the bucket. -
ACM certificate – In us-east-1, ensure it’s not in use by CloudFront (or any other service), then delete it:
aws acm delete-certificate \
--region us-east-1 \
--certificate-arn "arn:aws:acm:us-east-1:123456789012:certificate/..."
11. Best Practices
Architecture best practices
- Prefer DNS validation for public certificates to enable stable automation and renewals.
- Use CloudFront + ACM for global, low-latency HTTPS and to centralize edge TLS posture.
- Use separate certificates per environment (dev/test/prod) to reduce blast radius.
- For multi-region deployments, plan certificate placement:
- CloudFront: cert in
us-east-1 - Regional endpoints: cert in each region where the endpoint exists
IAM / security best practices
- Apply least privilege: separate roles for requesting certificates vs attaching them to services.
- Restrict destructive actions like
acm:DeleteCertificateto a small set of operators or CI roles with approval gates. - Use tag-based access control so teams can manage only their own certificates.
Cost best practices
- Remember: ACM public cert cost is rarely the main cost—the terminating service is.
- Consolidate distributions/load balancers when appropriate, but balance with isolation needs.
- Retire unused dev environments promptly (CloudFront/ALB costs can persist).
Performance best practices
- Terminate TLS at CloudFront or ALB rather than at individual instances where possible.
- Configure modern TLS policies in the terminating service (ALB/CloudFront policies evolve; review regularly).
Reliability best practices
- Use managed renewals whenever possible (ACM-issued public cert + DNS validation + supported service attachment).
- Set up alerts for imported certificates well ahead of expiration.
Operations best practices
- Centralize visibility:
- Use AWS Config rule(s) for expiration posture (verify current managed rules available to your account/region).
- Use EventBridge notifications for certificate lifecycle and operational reminders.
- Document ownership:
- Required tags:
Owner,Application,Environment,DataClassification(as applicable).
Governance / tagging / naming best practices
- Name/tag certificates with clear domain intent and ownership:
Domain=www.example.comPurpose=cloudfront-edgeTeam=platform- Enforce standards via:
- CI checks in IaC pipelines
- Service Control Policies (SCPs) in AWS Organizations (where applicable)
12. Security Considerations
Identity and access model
- ACM uses IAM for authentication/authorization.
- Secure patterns include:
- Request certificates via a controlled pipeline (CI/CD) rather than individual consoles.
- Separate “certificate request” permissions from “attach certificate to prod load balancer” permissions.
Encryption
- ACM’s purpose is enabling encryption in transit (TLS).
- Private key handling differs by certificate type:
- ACM-issued public certificates: private keys are managed by AWS and typically not exposed.
- Imported certificates: you provide private key material to ACM; treat this as sensitive and restrict who can import.
Network exposure
- ACM does not “open ports” by itself. Exposure comes from the service using the certificate (CloudFront/ALB/API Gateway).
- Ensure you also:
- Use WAF for L7 protections where appropriate
- Configure security groups/NACLs on origins
- Avoid accidentally making S3 buckets public when using CloudFront
Secrets handling
- Do not store private keys in source control or plaintext.
- If you must use imported certificates, handle keys via secure secret management and limit distribution. Consider using AWS Secrets Manager for temporary handling workflows (but do not confuse it with certificate deployment).
Audit/logging
- Enable CloudTrail and centralize logs.
- Monitor certificate changes:
- Who requested/imported a certificate?
- Who deleted it?
- Who attached it to production endpoints?
Compliance considerations
- ACM helps meet “encrypt in transit” requirements, but compliance also depends on:
- TLS policy configuration (protocol minimums, ciphers)
- Certificate governance (ownership, rotation, incident response)
- Logging and evidence retention
- Public certificates are generally logged in Certificate Transparency ecosystems by public CAs; behavior varies by CA and policy. Verify details if you have strict requirements.
Common security mistakes
- Requesting certs in the wrong region and then copying workarounds (leads to shadow processes).
- Overusing wildcard certificates, expanding blast radius if key material is ever compromised (imported cert case) or if attachment mistakes happen.
- Leaving imported certificates to expire due to lack of monitoring.
Secure deployment recommendations
- Prefer ACM-issued public cert + DNS validation + managed service attachment for internet-facing apps on AWS.
- For internal service-to-service TLS/mTLS at scale, evaluate ACM Private CA with clear issuance policies and short-lived certificates (verify supported patterns).
13. Limitations and Gotchas
- Region constraints:
- CloudFront requires ACM certs in
us-east-1. - Other services require the certificate in the same region as the service endpoint (commonly true for ALB, regional API Gateway, etc.). Verify per service.
- Export limitations:
- ACM-issued public certificates are designed primarily for AWS-integrated endpoints; private key export is generally not part of the standard public ACM model. If export is required, verify current AWS capabilities and consider imported certificates or private CA patterns.
- Imported certificates do not auto-renew:
- You must re-import renewed certs and update attachments if needed.
- DNS validation record must remain:
- Removing it can prevent renewal.
- Time-to-activate:
- Certificate issuance may be quick, but CloudFront distribution updates can take time to deploy globally.
- Quotas:
- Certificate counts and request rates are quota-limited. Use Service Quotas to confirm.
- Wildcard and SAN planning:
- Overly broad certificates can complicate ownership and security boundaries.
- Apex/root domain (
example.com) vswww.example.com: - DNS and CloudFront behaviors differ. Apex often requires Route 53 alias records and careful planning.
- Multi-account complexity:
- Certificates are not “global across accounts.” Cross-account patterns usually require requesting/importing in the correct account owning the endpoint.
14. Comparison with Alternatives
ACM is best understood as “managed certificates for AWS-integrated TLS termination.” Alternatives vary by control level and environment scope.
| Option | Best For | Strengths | Weaknesses | When to Choose |
|---|---|---|---|---|
| AWS Certificate Manager | Public TLS on AWS services (CloudFront/ALB/API Gateway) | Managed issuance and renewal (eligible certs), strong AWS integrations, reduced key handling | Region constraints, limited portability for ACM-issued public certs | You primarily terminate TLS on AWS managed services |
| ACM Private CA | Internal PKI and private certificates | Managed private CA lifecycle, policy-based issuance | Additional cost; requires PKI governance maturity | You need internal identities, private trust chains, mTLS at scale |
| AWS Secrets Manager (with your own cert process) | Storing cert/key material you manage | Strong secrets lifecycle and rotation primitives | Not a certificate authority; you still manage issuance and renewals | You must distribute certs to custom workloads and need secret storage |
| Let’s Encrypt + certbot (self-managed) | Low-cost public certs on self-managed servers | Free issuance, portable across environments | You run renewal automation, key storage, deployment, outage risk | You terminate TLS on non-AWS endpoints or need full portability |
| HashiCorp Vault PKI (self-managed) | Internal PKI with deep control | Highly customizable PKI, short-lived certs, mTLS patterns | Operational overhead, HA requirements, security burden | You need advanced internal PKI across hybrid/multi-cloud |
| Azure Key Vault Certificates | Azure-native certificate management | Tight Azure integrations | Cloud-specific; migration complexity | Your workloads are primarily on Azure |
| Google Cloud Certificate Manager | GCP-native certificate management | Tight GCP integrations | Cloud-specific; differing features/regions | Your workloads are primarily on GCP |
15. Real-World Example
Enterprise example: multi-brand global web platform
- Problem: A global enterprise runs dozens of brand sites and APIs. Certificates were historically purchased and renewed manually, causing near-expiration incidents and inconsistent TLS configurations.
- Proposed architecture:
- Route 53 hosts brand DNS zones.
- CloudFront serves brand sites with WAF and standardized TLS policies.
- ACM issues and renews public certificates (in
us-east-1) for CloudFront custom domains. - For regional APIs, API Gateway uses regional ACM certs; internal services use private certs via ACM Private CA (where required).
- CloudTrail + Config rules provide audit and expiration visibility.
- Why AWS Certificate Manager was chosen:
- Automates renewals for the majority of public endpoints.
- Integrates directly with CloudFront and API Gateway.
- Reduces private key handling and centralizes inventory.
- Expected outcomes:
- Near-zero certificate-expiration incidents for ACM-managed public endpoints.
- Faster onboarding of new domains.
- Improved compliance reporting and change traceability.
Startup/small-team example: HTTPS for a product landing page + API
- Problem: A startup needs secure custom domains for
www.example.comandapi.example.comwith minimal ops effort. - Proposed architecture:
- S3 + CloudFront for the static landing page.
- API behind an ALB or API Gateway.
- ACM public certificates with DNS validation; Route 53 records for validation and routing.
- Why AWS Certificate Manager was chosen:
- Simple issuance and no separate certificate vendor management for standard HTTPS use cases.
- Easy attachment to managed services; renewals are handled.
- Expected outcomes:
- Rapid, low-risk HTTPS rollout.
- Reduced operational burden on a small team.
- Clear upgrade path to WAF, multi-region, and private PKI later.
16. FAQ
-
Is AWS Certificate Manager the same as ACM Private CA?
No. AWS Certificate Manager (ACM) manages certificates and can issue public certificates. ACM Private CA is a separate service used to create and operate private certificate authorities for internal PKI. They are related but distinct. -
Do ACM public certificates cost money?
ACM public certificates are typically offered at no additional charge, but you pay for the AWS services that use them (CloudFront/ALB/API Gateway/Route 53). Confirm current details: https://aws.amazon.com/certificate-manager/pricing/ -
Do imported certificates renew automatically in ACM?
No. Imported certificates must be renewed externally and re-imported before expiration. -
Why can’t I see my certificate in CloudFront?
Most commonly because it’s in the wrong region. CloudFront requires ACM certificates inus-east-1. -
What validation method should I use: DNS or email?
DNS validation is generally recommended because it can be automated and supports managed renewals more reliably. -
Will ACM automatically renew my certificate?
For eligible ACM-issued public certificates (especially DNS-validated and in use by supported services), ACM can automatically renew. Verify the current renewal conditions in the ACM docs. -
Can I use ACM to issue EV (Extended Validation) certificates?
ACM’s public certificate offering is domain validation oriented. If you require OV/EV specifically, you may need a third-party CA and import the certificate (where supported). -
Can I export an ACM-issued certificate to install on my own server?
ACM-issued public certificates are generally designed for use with AWS-integrated services and typically aren’t exportable in the same way as downloaded certs from a CA. If you need portability, consider third-party certs you can deploy anywhere or validate current AWS capabilities for your certificate type in the official docs. -
What happens if I delete the DNS validation CNAME record?
You risk blocking renewal. The certificate might remain valid until expiration, but renewal may fail. -
How many domains can I put on one ACM certificate?
ACM supports SAN certificates and wildcards, but there are service limits. Check the current ACM limits in the User Guide and Service Quotas. -
Can I use one certificate across multiple regions?
Not directly. Certificates are regional resources. You typically request/import a certificate in each region where it’s needed (except CloudFront’sus-east-1requirement). -
Does ACM support wildcard certificates like
*.example.com?
Yes, wildcard names are supported for public certificates, but design carefully to avoid overly broad blast radius and ownership confusion. -
How do I monitor upcoming certificate expirations?
– Use ACM to list/describe certificates and checkNotAfter.
– Use AWS Config managed rules (if available) for expiration checks.
– Use EventBridge notifications and operational alerts.
For imported certs, proactive monitoring is essential. -
What’s the difference between using ACM with ALB vs terminating TLS on EC2 instances?
With ALB, AWS manages TLS termination, scaling, and certificate deployment; you avoid distributing private keys to instances and reduce per-instance CPU overhead. -
Can I use ACM certificates with Kubernetes (EKS) Ingress?
Commonly, EKS ingress controllers integrate with AWS load balancers (ALB/NLB). In that pattern, the load balancer uses the ACM certificate. Direct pod-level TLS still requires additional tooling. -
How long does it take for a certificate to be issued?
Often minutes for DNS validation, but timing depends on DNS propagation and validation checks. -
Does ACM provide certificate revocation controls?
Revocation mechanisms depend on CA and certificate type. For public certs, typical CA revocation/CT behaviors apply. For private PKI, ACM Private CA provides private issuance controls. Verify revocation specifics in official docs for your scenario.
17. Top Online Resources to Learn AWS Certificate Manager
| Resource Type | Name | Why It Is Useful |
|---|---|---|
| Official Documentation | ACM User Guide (Overview) — https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html | Canonical service behavior, validation, renewal, and integrations |
| Official Documentation | Request a public certificate — https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html | Step-by-step issuance process and validation details |
| Official Documentation | DNS validation — https://docs.aws.amazon.com/acm/latest/userguide/dns-validation.html | Best-practice validation method and renewal implications |
| Official Pricing | ACM pricing — https://aws.amazon.com/certificate-manager/pricing/ | Current pricing model and what is/isn’t charged |
| Official Pricing | ACM Private CA pricing — https://aws.amazon.com/private-ca/pricing/ | Cost model for private PKI (separate service) |
| Official Tooling | AWS Pricing Calculator — https://calculator.aws/ | Estimate CloudFront/ALB/Route 53 costs around certificate usage |
| Official Docs (CloudFront) | Using alternate domain names and HTTPS — https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html | Correct CloudFront custom domain and TLS configuration patterns |
| Official Docs (ELB) | HTTPS listeners for ALB — https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html | How to attach ACM certs to ALB HTTPS listeners |
| Official Docs (API Gateway) | Custom domain names — https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html | API Gateway custom domain + certificate requirements |
| Official Video | AWS YouTube Channel — https://www.youtube.com/@amazonwebservices | Service walkthroughs and best practices (search ACM/CloudFront HTTPS) |
| Official Updates | AWS What’s New — https://aws.amazon.com/new/ | Track new ACM features and integration changes |
| Community (reputable) | AWS re:Post — https://repost.aws/ | Practical Q&A and troubleshooting (validate against docs) |
18. Training and Certification Providers
-
DevOpsSchool.com
– Suitable audience: DevOps engineers, SREs, cloud engineers, platform teams
– Likely learning focus: AWS fundamentals, DevOps practices, security basics, automation
– Mode: check website
– Website URL: https://www.devopsschool.com/ -
ScmGalaxy.com
– Suitable audience: Developers, DevOps practitioners, build/release engineers
– Likely learning focus: SCM, CI/CD, DevOps tooling, cloud integrations
– Mode: check website
– Website URL: https://www.scmgalaxy.com/ -
CLoudOpsNow.in
– Suitable audience: Operations, CloudOps, SRE, infrastructure teams
– Likely learning focus: Cloud operations, reliability, monitoring, automation
– Mode: check website
– Website URL: https://www.cloudopsnow.in/ -
SreSchool.com
– Suitable audience: SREs, operations engineers, platform engineers
– Likely learning focus: SRE practices, reliability engineering, operational readiness
– Mode: check website
– Website URL: https://www.sreschool.com/ -
AiOpsSchool.com
– Suitable audience: Ops teams, SREs, engineers adopting AIOps
– Likely learning focus: AIOps concepts, automation, operational analytics
– Mode: check website
– Website URL: https://www.aiopsschool.com/
19. Top Trainers
-
RajeshKumar.xyz
– Likely specialization: DevOps/cloud training and guidance (verify offerings on site)
– Suitable audience: DevOps engineers, cloud beginners to intermediate
– Website URL: https://www.rajeshkumar.xyz/ -
devopstrainer.in
– Likely specialization: DevOps tooling and cloud-oriented training (verify course catalog)
– Suitable audience: Students, engineers transitioning to DevOps
– Website URL: https://www.devopstrainer.in/ -
devopsfreelancer.com
– Likely specialization: Freelance DevOps consulting/training resources (verify on site)
– Suitable audience: Small teams needing practical DevOps implementation help
– Website URL: https://www.devopsfreelancer.com/ -
devopssupport.in
– Likely specialization: DevOps support and enablement resources (verify services/training on site)
– Suitable audience: Teams needing operational support or hands-on guidance
– Website URL: https://www.devopssupport.in/
20. Top Consulting Companies
-
cotocus.com
– Likely service area: Cloud/DevOps consulting and implementation (verify service list on site)
– Where they may help: Architecture reviews, CI/CD, cloud migrations, operational readiness
– Consulting use case examples: setting up CloudFront + WAF patterns, standardizing TLS via ACM, landing zone practices
– Website URL: https://cotocus.com/ -
DevOpsSchool.com
– Likely service area: DevOps and cloud consulting, implementation support (verify on site)
– Where they may help: Delivery automation, platform enablement, security baselining
– Consulting use case examples: certificate governance patterns, IaC pipelines for ACM and edge deployments, operational runbooks
– Website URL: https://www.devopsschool.com/ -
DEVOPSCONSULTING.IN
– Likely service area: DevOps consulting services (verify service list on site)
– Where they may help: DevOps transformation, cloud operations, pipeline modernization
– Consulting use case examples: migrating from self-managed TLS termination to ALB/CloudFront with ACM, compliance reporting for certificates
– Website URL: https://www.devopsconsulting.in/
21. Career and Learning Roadmap
What to learn before AWS Certificate Manager
- TLS fundamentals: certificates, CAs, chains, CN/SAN, revocation basics
- DNS fundamentals: hosted zones, record types (A/AAAA/CNAME), TTL
- Core AWS basics:
- IAM (policies, roles)
- Route 53
- CloudFront and/or Elastic Load Balancing
- VPC basics if using ALB/NLB
What to learn after AWS Certificate Manager
- AWS WAF and secure edge patterns
- AWS Shield basics for DDoS resilience
- ACM Private CA for internal PKI and mTLS patterns
- Observability and governance:
- CloudTrail organization trails
- AWS Config rules and conformance packs
- Security Hub controls (where applicable)
- Infrastructure-as-code:
- AWS CloudFormation / CDK / Terraform patterns for certificate + DNS validation automation
Job roles that use it
- Cloud Engineer / DevOps Engineer
- Site Reliability Engineer (SRE)
- Platform Engineer
- Security Engineer / Cloud Security Engineer
- Solutions Architect
Certification path (AWS)
ACM appears as a supporting topic within broader AWS certifications rather than a stand-alone certification. Common paths: – AWS Certified Cloud Practitioner (baseline) – AWS Certified Solutions Architect – Associate/Professional – AWS Certified Security – Specialty (for broader security depth)
Always verify current exam guides for topic coverage.
Project ideas for practice
- Build CloudFront + S3 static site with ACM + Route 53 DNS validation (this lab).
- Add WAF managed rules and rate limiting to CloudFront.
- Build an ALB-backed microservice with HTTPS, HTTP→HTTPS redirect, and HSTS headers at the edge.
- Create a certificate inventory/reporting script using the AWS SDK that lists expiration dates and required tags.
- Design a multi-account certificate governance model (who can request/import/attach/delete).
22. Glossary
- ACM (AWS Certificate Manager): AWS service to request/import/manage TLS certificates and deploy them to integrated AWS services.
- TLS/SSL certificate: An X.509 certificate used for encrypting traffic and proving endpoint identity.
- Certificate Authority (CA): Entity that issues and signs certificates.
- Public certificate: A certificate trusted by browsers/OS trust stores, typically for internet-facing domains.
- Private certificate: A certificate issued by an internal/private CA, trusted only by systems where you install the private CA trust.
- SAN (Subject Alternative Name): Certificate field that allows one certificate to cover multiple DNS names.
- Wildcard certificate: Certificate that matches many subdomains (e.g.,
*.example.com). - DNS validation: Proving domain ownership by placing a DNS record.
- Email validation: Proving domain ownership by responding to validation emails.
- CloudFront: AWS CDN service; commonly terminates TLS at edge locations.
- ALB/NLB: Elastic Load Balancing services that can terminate TLS/HTTPS using ACM certificates.
- OAC (Origin Access Control): CloudFront mechanism to securely access private S3 origins.
- CloudTrail: AWS audit logging service for API activity.
- EventBridge: Event bus for reacting to service events (alerts/automation).
- AWS Config: Configuration compliance and drift detection service.
23. Summary
AWS Certificate Manager is AWS’s managed way to request, import, govern, and deploy TLS certificates for AWS-integrated endpoints. It matters because manual certificate management is a frequent source of outages and security mistakes, and ACM reduces both by automating issuance workflows and (for eligible public certificates) renewals.
In the Security, identity, and compliance toolbox, ACM is a foundational service for encrypting traffic in transit across CloudFront, load balancers, and API front doors. Cost-wise, public ACM certificates are typically not the main expense; the terminating services (CloudFront/ALB/Route 53/API Gateway) drive most costs. Security-wise, the biggest wins come from minimizing private key handling and enforcing governance through IAM, tagging, CloudTrail auditing, and proactive expiration monitoring (especially for imported certificates).
Use AWS Certificate Manager when you terminate TLS on AWS-managed services and want a low-ops, reliable certificate lifecycle. As your needs grow, the next learning step is to add governance (Config/EventBridge), edge protection (WAF), and—if you need internal PKI—evaluate ACM Private CA with clear issuance policies and operational controls.