diff --git a/content/master/guides/self-signed-ca-certs.md b/content/master/guides/self-signed-ca-certs.md
deleted file mode 100644
index d8386a57..00000000
--- a/content/master/guides/self-signed-ca-certs.md
+++ /dev/null
@@ -1,54 +0,0 @@
----
-title: Self-signed CA certs
-weight: 270
-description: "Configure Crossplane with self-signed certificates"
----
-
-{{}}
-Using self-signed certificates isn't advised in production, it's
-recommended to only use self-signed certificates for testing.
-{{}}
-
-When Crossplane loads Configuration and Provider Packages from private
-registries, you must configure it to trust the CA and Intermediate certs.
-
-You need to install Crossplane via the Helm chart with the
-`registryCaBundleConfig.name` and `registryCaBundleConfig.key` parameters
-defined. See [Install Crossplane]({{[}}).
-
-## Configure
-
-1. Create a CA Bundle (a file containing your Root and Intermediate
-certificates in a specific order). You can do this with any text editor or
-from the command line, so long as the resulting file contains all required crt
-files in the proper order. Often, this is either a single
-self-signed Root CA crt file, or an Intermediate crt and Root crt file. The
-order of the crt files should be from lowest to highest in signing order.
-For example, if you have a chain of two certificates below your Root
-certificate, you place the bottom level Intermediate cert at the beginning of
-the file, then the Intermediate cert that singed that cert, then the Root cert
-that signed that cert.
-
-2. Save the files as `[yourdomain].ca-bundle`.
-
-3. Create a Kubernetes ConfigMap in your Crossplane system namespace:
-
-```shell
-kubectl -n [Crossplane system namespace] create cm ca-bundle-config \
- --from-file=ca-bundle=./[yourdomain].ca-bundle
-```
-
-4. Set the `registryCaBundleConfig.name` Helm chart parameter to
-`ca-bundle-config` and the `registryCaBundleConfig.key` parameter to
-`ca-bundle`.
-
-{{}}
-The Helm docs cover providing Helm with parameter values during
-[`helm install`](https://helm.sh/docs/helm/helm_install/). An example block
-in an `override.yaml` file would look like this:
-```yaml
- registryCaBundleConfig:
- name: ca-bundle-config
- key: ca-bundle
-```
-{{}}
\ No newline at end of file
diff --git a/content/v2.0/guides/self-signed-ca-certs.md b/content/v2.0/guides/self-signed-ca-certs.md
deleted file mode 100644
index d8386a57..00000000
--- a/content/v2.0/guides/self-signed-ca-certs.md
+++ /dev/null
@@ -1,54 +0,0 @@
----
-title: Self-signed CA certs
-weight: 270
-description: "Configure Crossplane with self-signed certificates"
----
-
-{{}}
-Using self-signed certificates isn't advised in production, it's
-recommended to only use self-signed certificates for testing.
-{{}}
-
-When Crossplane loads Configuration and Provider Packages from private
-registries, you must configure it to trust the CA and Intermediate certs.
-
-You need to install Crossplane via the Helm chart with the
-`registryCaBundleConfig.name` and `registryCaBundleConfig.key` parameters
-defined. See [Install Crossplane]({{][}}).
-
-## Configure
-
-1. Create a CA Bundle (a file containing your Root and Intermediate
-certificates in a specific order). You can do this with any text editor or
-from the command line, so long as the resulting file contains all required crt
-files in the proper order. Often, this is either a single
-self-signed Root CA crt file, or an Intermediate crt and Root crt file. The
-order of the crt files should be from lowest to highest in signing order.
-For example, if you have a chain of two certificates below your Root
-certificate, you place the bottom level Intermediate cert at the beginning of
-the file, then the Intermediate cert that singed that cert, then the Root cert
-that signed that cert.
-
-2. Save the files as `[yourdomain].ca-bundle`.
-
-3. Create a Kubernetes ConfigMap in your Crossplane system namespace:
-
-```shell
-kubectl -n [Crossplane system namespace] create cm ca-bundle-config \
- --from-file=ca-bundle=./[yourdomain].ca-bundle
-```
-
-4. Set the `registryCaBundleConfig.name` Helm chart parameter to
-`ca-bundle-config` and the `registryCaBundleConfig.key` parameter to
-`ca-bundle`.
-
-{{}}
-The Helm docs cover providing Helm with parameter values during
-[`helm install`](https://helm.sh/docs/helm/helm_install/). An example block
-in an `override.yaml` file would look like this:
-```yaml
- registryCaBundleConfig:
- name: ca-bundle-config
- key: ca-bundle
-```
-{{}}
\ No newline at end of file
]