As of March 15, 2026, a significant change to the web's public key infrastructure (PKI) has taken effect. A mandate from the CA/Browser Forum, the governing body for TLS/SSL standards, has officially reduced the maximum validity period for all publicly trusted TLS certificates from 398 days (approximately 13 months) to 200 days (approximately 6.5 months). This policy change, enforced by all major browser vendors and Certificate Authorities (CAs) like DigiCert and Sectigo, aims to bolster internet security by reducing the risk associated with compromised or mis-issued certificates. The shorter lifespan ensures identity information is validated more frequently and limits the time an attacker can leverage a stolen certificate. This change will effectively double the renewal frequency for IT teams, making manual certificate management processes untenable and pushing the industry towards automated solutions like the ACME protocol.
This policy affects every organization that operates a public-facing website or service secured with a TLS/SSL certificate. This includes businesses of all sizes, government agencies, non-profits, and educational institutions worldwide. Organizations that have relied on manually purchasing and installing yearly certificates will be most impacted, as their workload will immediately double and continue to increase in the coming years.
The primary driver for this change is to improve security:
However, the operational impact on organizations is significant:
Organizations must adapt their processes to handle the new 200-day reality.
certbot) that can automatically handle certificate renewal, validation, and installation.Automating certificate lifecycle management is a form of secure configuration that mitigates the risks of shorter certificate lifespans.
Organizations must update their certificate management configurations and processes to comply with the new 200-day standard.
DigiCert proactively implements a 199-day maximum validity to prepare for the deadline.
The CA/Browser Forum mandate reducing TLS certificate validity to 200 days officially takes effect.
The next phased reduction to a 100-day maximum validity is scheduled to occur.
The final planned reduction to a 47-day maximum validity is scheduled to occur.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.