π Big news from AWS Certificate Manager (ACM):
You can now request exportable public TLS certificates and use them anywhere β whether it's on AWS, on-prem, or other cloud platforms.
Previously
You could only use ACM public certs inside AWS services (like CloudFront, ALB).
No access to the private key meant no usage on custom EC2 apps, containers, or hybrid setups.
But now
β You can export the cert + private key
β Use it on any compute workload
β Works for hybrid, multicloud, or on-prem use cases
π§ͺ Real-World Use Case
Letβs say youβre running a containerized app on a private EC2 instance (or even on-premises) and need a valid TLS cert from a trusted CA.
Before: You had to buy a cert from a 3rd party (like GoDaddy, Sectigo, etc).
Now: Just use ACM to get a public, exportable certificate, save time, cost, and integrate it into your automation workflows!
π¦ Key Features
π Exportable public certs with private key access
β±οΈ Fast issuance (once domain is validated)
π Valid for 395 days
π° Pricing:
- $15 per FQDN
- $149 per wildcard domain
π― No contract needed β one-time payment
π Integrated with CloudWatch events for lifecycle automation
π IAM policies to control who can request/export certificates
π‘οΈ Security Notes
You canβt export older certs issued before this feature
Only authorized IAM users can request exportable certs
Designed with zero trust and visibility in mind
π How to Get Started
Go to ACM console
Request a new public certificate
Mark it as exportable
Validate your domain
Download and install it where needed (EC2, Nginx, custom workload, etc)
π¬ Final Thoughts
This feature fills a big gap for those managing hybrid infrastructure, allowing seamless cert management with AWS automation β even outside the AWS ecosystem.
Itβs cheaper, faster, and tightly integrated with AWS tooling.
Perfect for DevOps, SREs, and security teams managing complex infra.
Have you tried this new ACM export feature?
Let me know how you're planning to use it in your workloads! π
Top comments (0)