To ensure security, flexibility, and minimal maintenance effort, we recommend the following:
- Trust the Let’s Encrypt CA
Instead of pinning the server certificate, include the Root and Intermediate Certificates of Let’s Encrypt in your trusted certificate chain. Specifically:
- ISRG Root X1 (Root Certificate)
- Let’s Encrypt R3 (Intermediate Certificate)
- Set Up Certificate Transparency (CT) Log Monitoring
Monitor all certificates issued for our domain through Certificate Transparency Logs. This enables you to detect any unauthorized certificate issuance and respond promptly if needed. Tools like crt.sh or the Google Certificate Transparency Log Viewer are excellent for this purpose. - Public Key Pinning (PKP) as a Fallback
If certificate pinning is essential for your use case, consider pinning the public key of our Let’s Encrypt certificate rather than the full certificate. This allows flexibility for certificate renewals as long as the public key remains the same. A backup key can also be provided for additional security if a key rotation becomes necessary.
We understand that these solutions may require some collaboration and discussion to align with your specific requirements. To facilitate this please do not hesitate to contact us, we can connect you with ome of our specialists to provide additional insights and work with your technical team to identify the best approach.