Skip to content

Webinar: Register For Our Upcoming Webinar

Register Now

47-Day Certificate Readiness

The Industry Is Moving to 47-Day Certificates.
Is Your Team Ready for It?

TLS certificate lifespans are shrinking fast. The maximum lifespan dropped to 200 days on March 15, 2026, will fall further to 100 days by March 2027, and will reach just 47 days by March 2029.

The Industry Is Moving to 47-Day Certificates.

Trusted By

  • American Airlines logo
  • Anheuser-Busch InBev logo
  • Blue Cross Blue Shield logo
  • Builders FirstSource logo
  • Centene Corporation logo
  • CBCInnovis logo
  • Dell Technologies logo
  • Intel logo
  • Intrado logo
  • JC Penney logo
  • Lumen logo
  • Magella Health logo
  • NTT Data logo
  • OU Health logo
  • P&G logo
  • Pega logo
  • Pfizer logo
  • Protegrity logo
  • N-CPHER logo
  • LivaNova logo
  • FAB logo

The 47-Day Mandate at a Glance

47

Days Maximum TLS certificate lifespan effective March 2029

8x

More certificate renewals required per year than today’s typical annual cycle

56.6%

Organizations already struggle to track certificate expiration dates today

$2.8M

Average cost of a certificate-related breach

THE PROBLEM

Why Most Organizations Aren’t Ready for the

47-Day Certificate Deadline?

Most teams are already stretched managing certificates at current volumes. The move to 47-day lifespans does not just increase renewal frequency; it also exposes every gap in your existing process.

01

Manual Processes Break Down

Renewing certificates 8 times a year per certificate is not a task spreadsheets or calendar reminders can handle reliably at any scale.

manual processes break down
02

Inventory Gaps Get Worse

Teams that lack a complete view of their certificate estate today will face compounding blind spots as renewal windows shrink to weeks.

inventory gaps get worse
03

DevOps Pipelines Get Blocked

Without automation in place, certificate renewals become a bottleneck that delays deployments and disrupts release cycles.

devops pipelines get blocked
04

Domain Validation Pressure Increases

By March 2029, domain control validation reuse periods also drop to 10 days, adding another layer of operational complexity on top of shorter lifespans.

domain validation pressure increases
05

Compliance Risk Grows

Frameworks like PCI-DSS, HIPAA, and GDPR require valid, properly managed certificates. More frequent renewals mean more opportunities for gaps that trigger audit findings.

compliance risk grows

THE STRATEGY

How to Address this

Strategically?

The shift to 47-day certificates is not just a compliance deadline. It is the moment automation stops being optional. Organizations need to build an infrastructure to handle short-lived certificates without adding headcount or operational burden.

001

Certificate Discovery First

A full inventory of every certificate across the environment is required before any automation can be reliably deployed.

002

Automation by Protocol

ACME, SCEP, and EST-based automation must be implemented so certificates renew on schedule without human intervention at every cycle.

003

PKI Architecture Review

The underlying PKI must be assessed for its ability to handle significantly higher issuance volumes generated by short-lived certificates.

004

Policy and Governance

Renewal policies, ownership rules, and escalation workflows must be defined and enforced before automation goes live.

005

PQC Readiness Alongside

The 47-day transition and post-quantum migration are happening at the same time and must be planned together to avoid duplicating infrastructure decisions.

This is the approach Encryption Consulting brings to every 47-day certificate lifecycle engagement.

FROM THE PRACTITIONERS

When I heard 47 days, the first thing I thought was, most organizations can't even tell you how many certificates they have, let alone renew them every six weeks. This isn't just a deadline, it's a forcing function. The teams that treat it that way and automate now will be fine. Everyone else is going to have a very hard 2029. We're here to make sure our clients are in the first group

AR

Amit Rastogi

Principal Engineer, Encryption Consulting

Products & Services

How We Support

Your Security Journey?

CBOM Secure

Cryptographic Discovery & Inventory

Discovers every certificate across your environment so you know exactly what needs to be brought under automated management before the deadline hits.

Explore CBOM Secure
CertSecure Manager

Certificate Lifecycle Management

Automates certificate issuance, renewal, and deployment at scale using ACME, SCEP, and EST protocols, built for high-frequency renewal cycles.

Explore CertSecure Manager
PKI-as-a-Service

A fully managed PKI built to handle the increased issuance load that comes with 47-day certificate lifespans, without requiring internal infrastructure changes.

Explore PKI-as-a-Service
Public Key Infrastructure Services

Hands-on advisory to assess your current PKI, identify gaps in your renewal process, and build a migration plan ahead of the March 2029 first reduction.

Explore PKI SERVICES
PQC Advisory Services

Plan your post-quantum migration alongside the 47-day transition so both are handled together rather than as separate projects.

Explore PQC Services

TRUSTED BY THE FORTUNE 500

4 of 5

Top Global Software Companies

4 of 5

Top Financial Services

3 of 5

Top Global Ranks

3 of 4

Top Energy & Utilities

Why Encryption Consulting?

Cryptography is Our Foundation

Certificate management and PKI are not services we expanded into. They are what Encryption Consulting was built to do, grounded in applied cryptography from the very start.

No Infrastructure Overhaul Required

CertSecure Manager integrates with your existing CA, ITSM, and DevOps tooling. You get automation without having to rebuild your infrastructure from the ground up.

One team for the full transition

From certificate discovery to PQC readiness, we cover the full scope of what is changing. You work with one team instead of coordinating multiple vendors across overlapping projects.

Discover Our

Latest Resources

Certificate Lifecycle Management

Public CA vs. Private CA: When to Use Which and Why It Matters More Than Ever

A comprehensive guide to choosing the right Certificate Authority (CA) model for your organization’s PKI strategy, and how to manage certificates at scale with CertSecure Manager.

Read more
Case Studies

White Paper

Introduction to Code Signing

Learn the fundamentals of code signing, from digital signatures and certificate validation to time-stamping and application reputation. Discover how to secure your software supply chain, protect against tampering, and build long-term trust across enterprise and consumer environments.

Read more
Case Studies

Video

The 2026 Guide to Upgrading Enterprise PKI and HSMs for Post Quantum Security

Explore expert insights on cybersecurity, PKI, and post-quantum readiness, with practical guidance to strengthen security and future-proof cryptography.

Watch Now
Case Studies