The Great PKI Debate: Implementation, Operations, and Security Deep Dive (Part 2)
Continuing our exploration of Microsoft Cloud PKI vs. Traditional Certificate Services with implementation strategies, operations, costs, and security analysis.

Welcome back! In Part 1, we covered the fundamental differences between traditional PKI and Cloud PKI, who holds the keys, and when each makes sense. Now it's time to get practical—let's talk about implementation, day-to-day operations, costs, and security scenarios you'll actually face.
If you're reading this, you're probably trying to answer one question: "Should I migrate some or all of my PKI to the cloud?" Let's work through that together.
"The difference between a successful PKI migration and a disaster is understanding what you're actually migrating—and what you're not."
Implementation Reality Check
Traditional PKI: The Long Road
Let me paint you a picture of a traditional PKI deployment. If you've done this before, you'll recognize every painful step:
Week 1-2: Planning and Design
- Design your CA hierarchy (root, subordinate CAs)
- Plan for offline root CA procedures
- Design certificate templates for different use cases
- Plan CRL and OCSP infrastructure
- Document everything (because you'll forget in 3 years)
Week 3-4: Infrastructure Build
- Deploy root CA server (physical or VM, preferably air-gapped)
- Harden the root CA operating system
- Generate root certificate (this moment always feels significant)
- Take root CA offline and lock it away
- Deploy issuing/subordinate CAs
- Configure high availability/clustering
Week 5-6: Integration
- Publish CA certificates to Active Directory
- Configure Group Policy for certificate auto-enrollment
- Set up CRL distribution points
- Test enrollment from client machines
- Troubleshoot (oh, you will)
Week 7+: Ongoing Operations
- Monitor CRL publication
- Plan for CA certificate renewal (hint: this is complicated)
- Manage certificate templates and permissions
- Handle offline root CA ceremonies every few years
Total Timeline: 4-8 weeks minimum, often 6+ months with complexity
Cloud PKI: The Fast Lane
Now compare that to Cloud PKI:
Day 1: Enrollment
- Enable Cloud PKI in your Intune tenant
- Create issuing policies
- Assign to device groups
Day 2: Testing
- Enroll a test device
- Verify certificate issuance
- Confirm it shows up in device inventory
Day 3: Rollout
- Expand to production device groups
- Monitor enrollment status
- Done
Total Timeline: Days, not weeks
Operational Differences
Traditional PKI Operations
Your operational checklist includes:
- Offline Root CA Ceremonies: Scheduled events to bring the root offline, perform operations, document everything
- CRL Monitoring: Watching CRL publication, managing distribution points, dealing with stale CRLs
- Certificate Renewal: Coordinating renewal of issuing CA certificates (this is a major event)
- Disaster Recovery: Practicing your root key recovery procedures
- Compliance Audits: Regular audits of who accessed the PKI, when, and why
- Hardware Maintenance: HSM updates, server patches, storage management
Cloud PKI Operations
Your operational checklist is much shorter:
- Monitoring Enrollment: Watching device enrollment success rates
- Policy Updates: Adjusting issuance policies as needed
- Troubleshooting: Helping devices that fail to enroll (usually device-side issues, not PKI)
Microsoft handles certificates expiring, rotating keys, distributing root certificates, and maintaining the infrastructure.
Cost Analysis: TCO Comparison
Traditional PKI Costs
Initial Deployment
- Hardware (HSM, servers, storage): $10,000 - $50,000+
- Software licenses (Windows Server, HSM firmware): $2,000 - $10,000
- Implementation/consulting: $15,000 - $100,000+
- Training: $5,000 - $20,000
Annual Operating Costs
- IT Staff (estimate 0.5-1 FTE): $60,000 - $120,000
- Hardware maintenance/support: $5,000 - $15,000
- Software renewals/support: $2,000 - $10,000
- Disaster recovery testing: $3,000 - $10,000
5-Year TCO: $160,000 - $500,000+
Cloud PKI Costs
Initial Deployment
- Licensing (included with E5): $0 (already paying for it)
- Implementation/setup: $0 - $5,000 (self-service or light consulting)
- Training: $0 - $2,000
Annual Operating Costs
- IT Staff (estimate 0.1 FTE): $12,000 - $20,000
- No hardware maintenance
- No software renewals (included)
5-Year TCO: $60,000 - $100,000
The Hidden Cost Factor
But here's what's not in those numbers: expertise.
Traditional PKI expertise is expensive and rare. If your current PKI admin leaves, replacing them costs serious money. Cloud PKI expertise is much more common—basically any Intune-savvy admin can manage it.
Certificate Lifecycle Management
Traditional PKI Lifecycle
Issuance: User or device requests → CA processes → Certificate issued → Device auto-enrolls or manually requests
Renewal: Device/user watches for certificate expiration → Requests renewal before expiry → CA auto-renews if configured properly → Updates certificate
Revocation: You decide a certificate is compromised → Request revocation → CA marks it revoked → Device learns about it via CRL or OCSP
Expiration: Certificate reaches end-of-life → You hope everything stops using it → Sometimes things still try → Chaos ensues
Cloud PKI Lifecycle
Issuance: Device enrolls in Intune → Cloud PKI automatically issues certificate → Device stores it
Renewal: Microsoft tracks expiration → Automatic renewal initiated before expiry → Device gets new certificate → You don't think about it
Revocation: You remove the device from Intune or revoke the policy → Certificate becomes invalid → Microsoft handles the technical details
Expiration: Certificates auto-expire and get replaced → No chaos
Security Scenario Analysis
Scenario 1: Certificate Compromise
Traditional PKI Response:
- Assess which certificates were compromised
- Initiate revocation process
- Monitor CRL propagation
- Audit all applications using the certificate
- Reissue certificates to affected systems
- Recovery time: Hours to days
Cloud PKI Response:
- Azure/Intune automatically handles revocation
- Affected devices removed from policy
- New certificates auto-issued to compliant devices
- Microsoft provides audit logs
- Recovery time: Minutes
Scenario 2: Root CA Compromise
Traditional PKI Response:
- This is your worst nightmare
- All certificates issued by that CA become untrustworthy
- You must communicate this to all certificate users
- Every device/system using certs from that CA must reissue
- Depending on scope, this could take weeks or months
- Potential compliance/legal implications
Cloud PKI Response:
- Microsoft's problem, not yours (but also your trust problem)
- Microsoft would need to communicate the compromise
- Automatic remediation across all customers
- You're dependent on Microsoft's response time and capability
- The reputational risk belongs to Microsoft, not you
Scenario 3: Compliance Audit
Traditional PKI Audit:
- "Show me who accessed the root CA and when"
- Dig through server logs, HSM audit logs, documentation
- Verify key custody chain
- Document disaster recovery procedures
- Prove key destruction procedures
Cloud PKI Audit:
- "Show me the Microsoft SOC 2 report"
- Show Azure audit logs for policy changes
- Done (mostly)
Migration Strategies: If You're Considering the Move
The Hybrid Approach (Most Common)
Phase 1: Add Cloud PKI**
- Enable Cloud PKI in Intune
- Deploy to non-critical Intune-managed devices first
- Monitor success rates
Phase 2: Gradual Rollout
- Expand to more device groups
- Keep traditional PKI for everything else
- Run in parallel for 6-12 months
Phase 3: Retire Workloads from Traditional PKI
- For workloads that don't need traditional PKI capabilities, migrate them out
- Keep traditional PKI for what it does best
This is pragmatic and low-risk.
The Full Migration Approach (Rare)
This only works if your organization truly doesn't need traditional PKI capabilities. Most enterprises can't claim this.
Decision Framework: Should You Adopt Cloud PKI?
Ask yourself these questions:
1. Do you manage devices through Intune?
- No → Cloud PKI won't help you
- Yes → Continue to next question
2. Do you need device certificates?**
- No → You don't need Cloud PKI
- Yes → Continue to next question
3. Do you need user certificates, code signing, or other traditional PKI use cases?**
- Yes → You'll need both traditional and cloud PKI
- No → Cloud PKI might be sufficient
4. Do you have compliance requirements for key sovereignty?**
- Yes → You must keep traditional PKI (at minimum)
- No → Continue to next question
5. Is reducing operational overhead important to you?**
- Yes → Adopt Cloud PKI for device certificates
- No → Stick with traditional if it works for you
Conclusion: No Single Right Answer
After all of this, here's the truth: Most organizations will end up with a hybrid approach—traditional PKI for the things it excels at, Cloud PKI for the modern device certificate scenarios it was built for.
The question isn't "Cloud or Traditional?" It's "How do I get the benefits of both?"
"The most successful PKI strategies I've seen aren't about choosing one path—they're about being intentional about which tool solves which problem."
Final Thoughts
Whether you're just starting with certificates or managing a legacy PKI that's been running for 15 years, take the time to evaluate Cloud PKI as a complement to your existing infrastructure. The fact that it's now included with E5 removes the licensing barrier—you might as well explore it.
And if you're building something new? A cloud-first, Intune-managed organization with simple device certificate needs? Cloud PKI could be exactly the right choice.