47-day SSL/TLS certificates will be the new standard in 2029
The newly approved measure, initially proposed by Apple and endorsed by Sectigo in January 2025, will gradually reduce certificate lifespans from the current 398 days to 47 days through a phased approach.
Ballot SC-081v3 formally passed on April 11th, 2025, putting the phased reduction into effect with the following enforcement dates:
March 15, 2026: Maximum certificate lifespan reduced to 200 days
March 15, 2027: Further reduction to 100 days
March 15, 2029: Final enforcement of the 47-day maximum lifespan
This change, supported by Sectigo—a leading certificate authority— and major browsers like Apple and Google, marks a turning point for digital certificate management. Organizations will now need to renew certificates nearly every month, an unsustainable pace without an automated solution
Here’s what this means for your business ➔


Manual certificate management is overwhelming
With public certificates needing renewal every 47 days, as opposed to the current 398-day term, businesses will soon face near-monthly renewal cycles rather than annual ones.
Manual certificate management is already difficult and time-consuming. With 47-day certificate validity periods, it will become impossible, especially as the first enforcement milestone approaches in March 2026. Certificate terms will be cut in half, from 398 days to 200 days, effectively doubling the workload for IT and security teams. The time to automate isn’t in 2029. Businesses need to begin preparing now by moving to an automated certificate lifecycle solution.
This shift will dramatically increase the operational workload, leading to:
- 12x more certificates to manage
- 12x more work security and IT teams
- 12x higher risk of missing a renewal and triggering outages
Challenges you might face if you manually manage your digital certificates:

Complexity
Managing multiple validations and configurations is already time-consuming, and shorter certificate lifespans will make it even more difficult.

Risk
Forgotten certificates can lead to security breaches, outages, and dangerous vulnerabilities.

Inefficiency
Manual processes are prone to errors, delays, and security risks.
Certificate outages impact everyone
Around 81% of companies have experienced a certificate-related outage in the past two years. Certificate outages happen when digital certificates expire or become invalid, causing security and operational challenges. Implementing an automated Certificate Lifecycle Management (CLM) solution, such as Sectigo Certificate Manager (SCM), helps prevent outages and disruptions by ensuring certificates are always up-to-date.

What happens if no action is taken
When a certificate expires and isn't renewed on time, it triggers a browser warning informing users that their connection is no longer private, causing them to leave the site assuming (rightly so) that the site is unsafe. These warnings not only drive customers away but also damage a business's reputation. The financial impact can be severe, with businesses losing both immediate sales and future revenue as digital trust deteriorates.
By the time 47-day certificates become the standard, the time between issue and expiration will be measured in weeks, not months, amplifying the impact of even brief delays in renewal.
But this is just the tip of the iceberg. A missed certificate renewal can also lead to outages, data breaches, service disruptions, and costly non-compliance fines.

It’s time to automate. Here’s your path forward:
Carry out a full SSL/TLS certificate discovery for an inventory of both internal and external certificates.
Compile a comprehensive list of vendor technologies that require those certificates to function.
Identify the relevant automation protocols for each technology in your inventory.
Build your deployment plan around key milestones, starting with 200 days in 2026 and reaching 47-day certificates by 2029.
Ensure long-term security and agility for continuous cryptographic readiness.
We’re here to make the transition easy
We support this industry-wide shift to shorter certificate lifespans because it’s the right move for security, agility, and digital trust. At the same time, we recognize the operational challenges this change can bring. That’s why we’re 100% committed to helping organizations like yours navigate this transition seamlessly. Our goal is to make certificate automation and crypto agility as simple and stress-free as possible so you’re not just ready for the 47-day future, you’re confident in it.
47-day survival guide
With the CA/B Forum’s official approval of Apple’s proposal for 47-day certificate lifespans, organizations must begin preparing now. Manual management simply won’t scale. Download our free survival guide to ensure your team is ready for the transition.


SCM can prepare your organization for 47-day SSL/TLS certificate lifespans
