Skip to main content
  1. Home
  2. >
  3. AWS
  4. >
  5. SAA-C03
  6. >
  7. AWS SAA-C03 Exam Scenarios
  8. >
  9. External CA Certs on ALB Rotation | SAA-C03

External CA Certs on ALB Rotation | SAA-C03

Jeff Taakey
Author
Jeff Taakey
21+ Year Enterprise Architect | Multi-Cloud Architect & Strategist.

While preparing for the AWS SAA-C03, many candidates get confused by AWS Certificate Manager’s capabilities and incorrectly assume all ACM features work with external certificates. In the real world, this is fundamentally a decision about automation boundaries vs. compliance requirements. Let’s drill into a simulated scenario.

The Scenario
#

RetailNova Inc., an emerging e-commerce platform, is launching their customer-facing web application on AWS. Due to corporate governance policies established by their parent company, they must use SSL/TLS certificates issued by their existing enterprise Certificate Authority (DigiCert) rather than obtaining new certificates from AWS-managed sources.

The architecture team has designed the application to run behind an Application Load Balancer (ALB) to handle traffic distribution across multiple EC2 instances. The security team has mandated annual certificate rotation and wants to minimize manual intervention wherever possible.

Key Requirements
#

Deploy the web application with externally-issued SSL/TLS certificates on the ALB while ensuring compliance with the annual rotation policy and minimizing operational overhead.

The Options
#

  • A) Use AWS Certificate Manager (ACM) to issue a new SSL/TLS certificate. Apply the certificate to the ALB. Rely on ACM’s managed renewal feature for automatic rotation.

  • B) Use AWS Certificate Manager (ACM) to issue a certificate and import custom key material from the external CA. Apply the certificate to the ALB. Rely on ACM’s managed renewal feature for automatic rotation.

  • C) Use AWS Certificate Manager (ACM) Private Certificate Authority to create a root CA and issue SSL/TLS certificates. Apply the certificate to the ALB. Use ACM’s managed renewal feature for automatic rotation.

  • D) Import the externally-issued SSL/TLS certificate into AWS Certificate Manager (ACM). Apply the certificate to the ALB. Configure Amazon EventBridge to trigger notifications when the certificate approaches expiration. Manually renew and re-import the certificate annually.

Correct Answer
#

Option D.

Step-by-Step Winning Logic
#

This solution is the only architecturally valid approach when you face the hard constraint of using an external Certificate Authority. Here’s the critical reasoning chain:

  1. Constraint Recognition: The requirement explicitly states “external CA” - this immediately eliminates any solution involving ACM-issued certificates
  2. ACM’s Role Shift: ACM becomes a certificate storage and deployment service, not a certificate lifecycle manager
  3. Automation Boundaries: ACM’s managed renewal is limited to certificates it issues; imported certificates require external renewal processes
  4. Operational Safety Net: EventBridge notifications create a detection mechanism to prevent expiration-related outages (typically 30-60 days before expiry)

The Real-World Trade-off: You’re accepting manual intervention in exchange for compliance. The alternative (ignoring the external CA requirement) could trigger audit failures or violate corporate policies.


💎 The Architect’s Deep Dive: Why Options Fail
#

The Traps (Distractor Analysis)
#

Why not Option A?

  • Fatal Flaw: ACM-issued certificates use Amazon’s trust chain, not the external CA required by policy
  • Exam Trap: Tests whether you understand ACM can both issue and import certificates with different capabilities for each
  • Real Impact: Would fail security compliance audits immediately

Why not Option B?

  • Technical Impossibility: You cannot “import key material” into an ACM-issued certificate - this conflates two separate ACM functions
  • Exam Trap: Designed to confuse candidates about how ACM handles cryptographic material
  • Red Flag: This hybrid approach doesn’t exist in ACM’s service model

Why not Option C?

  • Wrong CA Type: ACM Private CA creates an internal certificate authority, not integration with an external enterprise CA like DigiCert
  • Cost Explosion: ACM Private CA costs $400/month for the CA alone, plus $0.75 per certificate - overkill for this use case
  • Exam Trap: Tests understanding of the difference between ACM (certificate management), ACM-issued public certs, and ACM Private CA (internal PKI infrastructure)

💎 Professional Decision Matrix

This SAA-C03 professional section is locked.
Free beta access reveals the exam logic.

100% Free Beta Access

The Architect Blueprint
#

graph TD
    A[External CA - DigiCert] -->|Annual Certificate Request| B[Security Team]
    B -->|Certificate + Private Key| C[ACM Import Process]
    C --> D[ACM Certificate Store]
    D -->|Certificate Attached| E[Application Load Balancer]
    E --> F[EC2 Target Group]
    
    G[EventBridge Scheduled Rule] -->|Check Every 24h| D
    D -->|Certificate Metadata| H{Days Until Expiry < 60?}
    H -->|Yes| I[SNS Topic]
    I --> J[Security Team Email/Slack]
    J -.->|Triggers Manual Renewal| A
    
    style D fill:#FF9900,stroke:#232F3E,stroke-width:3px,color:#fff
    style E fill:#8C4FFF,stroke:#232F3E,stroke-width:2px,color:#fff
    style G fill:#FF4F8B,stroke:#232F3E,stroke-width:2px,color:#fff
    
    classDef external fill:#3B48CC,stroke:#232F3E,stroke-width:2px,color:#fff
    class A,B external

💎 Professional Decision Matrix

This SAA-C03 professional section is locked.
Free beta access reveals the exam logic.

100% Free Beta Access

Diagram Note: The EventBridge rule continuously monitors ACM certificate metadata, triggering SNS notifications when expiration approaches, ensuring the manual renewal workflow initiates with adequate lead time.

The Decision Matrix
#

Option Est. Complexity Est. Monthly Cost Pros Cons
A (ACM-Issued Cert) Low $0 (ACM public certs are free) Fully automated renewal; Zero operational overhead Violates external CA requirement; Fails compliance; Wrong trust chain
B (Hybrid Approach) N/A N/A N/A Technically impossible; This capability doesn’t exist in ACM
C (ACM Private CA) High ~$400/month (CA) + $0.75/cert Full automation; Internal PKI control Wrong CA type (internal vs external); Massive cost overrun; Doesn’t meet requirement
D (Import + EventBridge) ✅ Medium ~$5-15/month (EventBridge: <$1, SNS: <$1, potential Lambda: ~$3-13) Meets external CA requirement; Proactive expiration alerting; Compliant with policy Requires manual renewal workflow; Human-in-the-loop dependency; Annual operational task

Cost Quantification Notes:

  • EventBridge rule (1/day check): ~30 invocations/month = $0.03
  • SNS notifications: <10 messages = $0.50
  • Optional Lambda for enriched notifications: ~100 invocations/year = ~$0.20/month
  • External CA certificate cost not included (varies: $50-500/year depending on vendor)

💎 Professional Decision Matrix

This SAA-C03 professional section is locked.
Free beta access reveals the exam logic.

100% Free Beta Access

Real-World Practitioner Insight
#

Exam Rule
#

For the SAA-C03 exam, when you see:

  • External Certificate Authority” or “third-party CA” → Immediately eliminate ACM-issued certificate options
  • Automatic renewal” with ACM → Only applies to ACM-issued certificates, not imported ones
  • Import certificate” → Expect manual renewal processes with EventBridge/CloudWatch monitoring

Key Exam Pattern: AWS loves testing the boundary between what ACM can automate (its own certificates) vs. what it cannot automate (external certificates).

Real World
#

In production environments, we typically enhance this base architecture with:

  1. Infrastructure-as-Code Integration: Store certificate import in AWS Secrets Manager, automate deployment via Terraform/CloudFormation with version control
  2. Extended Monitoring: Combine EventBridge with AWS Config rules to detect certificate expiration across all imported certificates organization-wide
  3. Certificate Automation Tooling: Integrate with ACME protocol automation (e.g., Certbot) for external CAs that support it, reducing manual steps
  4. Runbook Automation: Create AWS Systems Manager Automation documents that guide operators through the renewal import process step-by-step

The Enterprise Reality: Many large organizations are stuck with external CAs due to:

  • Legacy PKI infrastructure investments ($500K+ already spent)
  • Regulatory requirements mandating specific CA vendors (e.g., government contracts)
  • Certificate pinning in mobile applications requiring consistent trust chains

Hybrid Approach: For organizations with flexibility, we often recommend:

  • Public-facing services: Use ACM-issued certificates (free, automated)
  • Internal/compliance-critical services: Use imported certificates from enterprise CA
  • Development environments: ACM Private CA for testing internal PKI scenarios

💎 Professional Decision Matrix

This SAA-C03 professional section is locked.
Free beta access reveals the exam logic.

100% Free Beta Access