TLS certificates are changing: What you need to know

Executive summary: TLS certificates are about to get significantly shorter-lived. Starting 15 March 2026, newly issued public-trust certificates will max out at 200 days—and just three years later, that lifespan drops to 47 days. Backed by Google, Apple, and Mozilla, this shift aims to make the web safer through fresher data, faster failover, and forced automation. To keep pace—and stay secure—organizations need to inventory, automate, and integrate certificate management right now. Red Sift Certificates makes it easy to adapt and scale for this new reality.

Key takeaways: 

  • Certificate lifespans are shrinking fast: Starting March 2026, TLS certificates will last just 200 days—dropping to 100 days in 2027 and 47 days by 2029. This isn’t just a technicality—it fundamentally changes your renewal cadence and risk posture.
  • Automation is now mandatory: With up to 7,500 renewals a year for large estates, manual processes will fail. Automate discovery, renewal, and recovery using tools like ACME and cloud-native APIs.
  • Red Sift Certificates future-proofs your strategy: Helping you find every certificate, auto-renew them, and monitor for issues—so you stay secure, compliant, and ahead of looming expiration deadlines.

TLS certificates are set to expire faster, with the first change being less than a year away. On 15 March 2026, every newly issued public-trust TLS certificate must max out at 200 days. 

One year later the ceiling drops again to 100 days, and by 15 March 2029 you’ll be renewing every 47 days. The decision, codified in CA/Browser Forum Ballot SC-081, sailed through in April 2025 with backing from Google, Apple, Microsoft, Mozilla and every major certificate authority.​ The simple reality? Any certificate you issue in the second half of 2025 will expire five months sooner than you planned the moment the rule takes effect. 

How did we get here?

Certificate lifetimes have been reducing for years. 5 years in 2018, 2 years in 2020, 13 months in 2021, and now this three-step sprint. The case for shorter validity is simple:

Reason
Benefit
Fresh identity data
Organizations change names, addresses and IP blocks rapidly. Frequent reissuance keeps the certificate ecosystem accurate.

Streamlined revocation
Browsers routinely skip Online Certificate Status Protocol (OCSP) and Certificate Revocation List (CRL) checks to save milliseconds. Expiration is the only revocation signal every client honours.
Crypto agility
When post-quantum algorithms ship, a 47-day roll-over means you can upgrade in weeks, not years.
Forced automation
At four (soon eight) renewals a year, manual spreadsheets collapse under their own weight.

Industry leaders argue that short certificates are safer not because they never fail, but because they fail fast and visibly, encouraging automatic recovery.​

The operational reality

Take an estate of 1000 certificates:

  • Under today’s 398-day rule you plan roughly 1,000 change windows per year.
  • The 200-day cap doubles that to ~2,000.
  • Two years later you’re at ~3,600.
  • With 47 days you’re facing 7,500 renewals annually.

And that’s before counting certificates you don’t know about—the ones embedded in staging subdomains, mobile apps, forgotten IoT widgets or an engineer’s personal test site. 

Remember the mid-April 2025 Zoom meltdown? A registrar mis-flagged zoom.us as serverHold, and 300 million users were locked out for almost two hours.

Five moves to make before March 2026

  1. Inventory everything—automatically: Use active scanning and public-log monitoring to discover every certificate, public or private, issued by any CA.
  2. Adopt Automated Certificate Management Environment (ACME) or native cloud Application Programming Interface (APIs): Most major Certificate Authorities (CAs), clouds and load balancers speak ACME. Script renewals now; you’ll thank yourself when the window shrinks to 47 days.
  3. Integrate renewal into Continuous Integration/ Continuous Deployment (CI/CD): Treat certificates like code: version-control them, push with infrastructure-as-code and roll back instantly.
  4. Test expiration failure and auto-recovery: Stage an intentional lapse in a non-production environment. Verify that alerts fire, auto-renewals trigger and services restart with a fresh certificate.
  5. Educate developers and DevOps teams: Certificates touch every layer—from API gateways to build pipelines. Make sure anyone who spins up an endpoint understands the new shelf life.

Get support with Red Sift Certificates

Red Sift Certificates makes it easy for businesses to stay ahead of the accelerating TLS certificate renewal cycle. With certificate lifetimes dropping to 200 days in 2026—and just 47 days by 2029—manual tracking and renewals simply won’t cut it.

Red Sift supports discovery and monitoring, which will help the renewal process across your entire infrastructure, keeping you secure and in sync, without the risk of human error or missed expiry dates. As an added value, the Red Sift Certificates will perform an assessment on the configuration of your deployed certificates to avoid any unintended vulnerabilities. 

As the industry shifts toward shorter certificate lifespans, Red Sift Certificates ensures your organization doesn’t just keep up—it leads. By integrating directly with ACME and native cloud APIs, it renews and deploys certificates seamlessly, reducing downtime and keeping you compliant. Dashboards track every certificate against the new 200/100/47-day standards, while real-time alerts surface issues before they reach your users. It’s proactive, scalable security built for the future of the web.

The time for action is now

The CA/Browser Forum gave a timetable, not a buffer. The 200-day rule lands during the budgeting season; the 100-day cut arrives as you prepare for next year’s holiday freeze; the 47-day sprint hits right before the 2030 financial year. The sooner you automate, the less these dates will matter.

Stay one step ahead today: Book a Red Sift Certificates demo and get started.

PUBLISHED BY

Jack Lilley

24 Apr. 2025

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more
DMARC

More than 50% of US banks remain vulnerable to phishing attacks

Stuart Rogers

Executive summary: Over half of major U.S. banks remain exposed to phishing attacks because of weak or absent DMARC enforcement, despite rising cybercrime losses and increasingly sophisticated email threats. Operational challenges, regulatory gaps, and underestimation of risk hinder stronger protections, putting customer trust and financial stability in jeopardy. Key takeaways Email remains the primary…

Read more
Product Release

Stream Red Sift telemetry to Sentinel, Splunk, and more with Event Hub

Francesca Rünger-Field

Event Hub is a new capability that streams real-time, structured security events from Red Sift products into the platforms security teams already use: SIEMs, SOARs, XDRs, ticketing tools, messaging platforms, and cloud storage. It enables faster, more consistent response by pushing telemetry directly into the workflows where detection, triage, and remediation already happen. Whether…

Read more
Thought Leadership

How the EU can mandate stronger email security

Antony Seedhouse

Executive summary: The article examines how the EU can proactively close email security gaps by leveraging the NIS2 Directive to mandate robust, harmonized standards like DMARC, DKIM, and SPF across all member states. By acting now, the EU not only protects its digital ecosystem but also sets a global benchmark for cybersecurity best practices.…

Read more