As of March 15, 2026, a significant change to the web's public key infrastructure (PKI) has taken effect. A mandate from the CA/Browser Forum, the governing body for TLS/SSL standards, has officially reduced the maximum validity period for all publicly trusted TLS certificates from 398 days (approximately 13 months) to 200 days (approximately 6.5 months). This policy change, enforced by all major browser vendors and Certificate Authorities (CAs) like DigiCert and Sectigo, aims to bolster internet security by reducing the risk associated with compromised or mis-issued certificates. The shorter lifespan ensures identity information is validated more frequently and limits the time an attacker can leverage a stolen certificate. This change will effectively double the renewal frequency for IT teams, making manual certificate management processes untenable and pushing the industry towards automated solutions like the ACME protocol.
This policy affects every organization that operates a public-facing website or service secured with a TLS/SSL certificate. This includes businesses of all sizes, government agencies, non-profits, and educational institutions worldwide. Organizations that have relied on manually purchasing and installing yearly certificates will be most impacted, as their workload will immediately double and continue to increase in the coming years.
The primary driver for this change is to improve security:
However, the operational impact on organizations is significant:
Organizations must adapt their processes to handle the new 200-day reality.
certbot) that can automatically handle certificate renewal, validation, and installation.Automating certificate lifecycle management is a form of secure configuration that mitigates the risks of shorter certificate lifespans.
Organizations must update their certificate management configurations and processes to comply with the new 200-day standard.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats