A Certificate Rotate Does Not Fix Identity Ambiguity

Dec 22, 2025

Failure Pattern

A certificate rotate updates credentials but does not fix the underlying identity ambiguity. Attackers still impersonate workloads using other methods.

 

What We See in the Field

After a certificate rotate event, workloads continue to reuse identity derived from metadata. Attackers compromise one instance and still appear legitimate.

 

Underlying Causes

Certificates not tied to hardware
Automation copying certificates incorrectly
Orchestrators reissuing certificates to clones
Metadata-based identity
No immutable trust anchor

 

Trust-Native Network Resolution

DTL binds identity to a workload’s fingerprint. Rotations do not affect identity correctness. Attackers cannot reuse or inherit trusted credentials.

 

Broken Trust Assumption

The attacks that exposed this failure pattern were not stealthy break-ins. They were trusted operations.

During incidents such as SolarWinds, Capital One, and Okta, malicious activity was carried out using valid identities and approved execution paths. Certificates were valid. Tokens were accepted. Sessions were authenticated. From the system’s point of view, nothing appeared wrong.

This is the risk of trust inferred from credentials, location, or prior authentication.