Certificate Authorities Compared: Why Your Own CA with YubiHSM?

A comprehensive comparison of public CAs and self-hosted PKI solutions.

The World's Largest Certificate Authorities

RankCAMarket ShareHeadquarters
1Let's Encrypt64.1%USA (ISRG)
2GlobalSign23.7%Belgium/Japan (GMO)
3Sectigo5.9%USA
4GoDaddy Group3.9%USA
5DigiCert Group1.9%USA

Source: W3Techs, December 2025

German Certificate Authorities

CADescription
D-TrustSubsidiary of Bundesdruckerei, qualified trust service provider under eIDAS. Focus on healthcare (eHBA, SMC-B), government and critical infrastructure.
Deutsche TelekomT-Systems TeleSec, long-standing provider for enterprise PKI and SSL certificates.
ProcilonGerman security specialist from Saxony, offering certificate management solutions and PKI services for enterprises and public sector.

Signando CA vs. Internet CAs: The Comparison

CriterionInternet CASignando CA + YubiHSM 2
Key ControlCA generates and stores private keys100% under your control in Hardware Security Module
Data SovereigntyCertificate data with third party (often USA)Completely internal, air-gapped operation possible
DependencyVendor lock-in, price changes, shutdown riskFully independent and self-managed
Revocation RiskCA can revoke certificates at any timeOnly your organization decides
Certificate TransparencyAll public TLS certificates published in CT logsInternal certificates remain private
Audit TrailAt provider, limited visibilityFully controllable internally
CostsPer certificate and year (EV: €100-500/year)One-time license + YubiHSM 2 (~€650)
Certificate Lifetime90 days (Let's Encrypt) to max 1 yearFreely configurable per internal policies
Internal PKINot intendedCore functionality
Offline OperationImpossibleNative support for air-gap environments

When Is Your Own CA the Better Choice?

Signando CA is particularly suited for:

  • Companies with strict compliance requirements (GDPR, BSI, critical infrastructure)
  • Organizations prioritizing digital sovereignty
  • Air-gapped environments without internet access
  • Internal PKI for devices, employees and services
  • Code signing and document signing under your own control
  • Developers and DevOps teams needing flexible certificate lifetimes
  • Microservices and container environments requiring mutual TLS (mTLS) authentication
  • Internal development and test environments requiring valid certificates

Internet CAs make sense for:

  • Publicly accessible websites (browser trust required)
  • Small businesses without PKI expertise
  • Quick setup without own infrastructure

⚠️ When you should NOT use Signando CA:

  • Public web servers: Your Signando CA root certificate is not pre-installed in browsers. Visitors to your website would see security warnings because their browsers don't trust your self-generated certificates.
  • Public-facing APIs: External clients and partners would need to manually install your root certificate, which is impractical for public services.
  • Email S/MIME for external recipients: Recipients outside your organization won't trust certificates signed by your private CA.

For these use cases, you need certificates from a publicly trusted CA whose root certificates are already distributed in browsers and operating systems.

Conclusion

Public CAs like Let's Encrypt or DigiCert fulfill their purpose for publicly accessible web servers. For internal infrastructure, sensitive environments, and everywhere that control, privacy, and independence are critical, your own CA with a Hardware Security Module is the sovereign alternative.

With Signando CA and a YubiHSM 2, you operate your PKI completely under your own control – without dependency on third parties, without data leakage, and without compromises on security.

View Pricing Read FAQ