Are compromised private keys that much of a problem in the real world to merit such a pain in the ass, heavy handed "solution"? On paper, sure, it makes sense. In practice, you're forcing people to complicate the process by introducing, until now, unnecessary automation and introducing the possibility of brand new points of vulnerability.
I say this as someone who does maintain legacy systems (i.e. systems), so take it with a very angry, frazzled grain of salt. But I've done this for ~~years~~ decades and many, many systems and to my knowledge, I've never had a compromised private key.
This just seems like people who constantly lose their house keys mandating that everyone else change their locks as often as they do.