Akamai acquires Fermyon to combine WebAssembly function-as-a-service (FaaS) with Akamai’s globally distributed platform. Read news

How to Automate Your Security Posture for the 47-Day Certificate Era

Oct 16, 2025

Brian Fahey

Written by

Brian Fahey

Brian Fahey is a Senior Manager in Product Management at Akamai.

Share

The era of 47-day certificates is coming. And with it comes a pivotal opportunity to strengthen your security posture.

Anyone who manages digital infrastructure or works in cybersecurity has likely heard about the CA/Browser Forum's Ballot SC-081v3, passed in April 2025. This landmark decision will ultimately reduce the maximum certificate validity period from 398 days to just 47 days. That change is scheduled to take full effect by March 2029, but the time to act is now.

Instead of seeing this as a compliance challenge, forward-thinking organizations are recognizing it as a chance to strengthen their overall security posture.

What’s changing and why it matters

Let’s take a look at what’s changing.

  • A certificate you had previously renewed annually will now require renewal approximately eight times per year (~ every 47 days).

  • Domain validation, once an annual task, will have to be done every 10 days.

  • The margin for error and outages gets dramatically smaller because the window to detect and remediate issues shrinks from months to just days.


Without robust automation, organizations will face increased outages, security vulnerabilities, and compliance issues. According to a Keyfactor study, certificate-related outages already cost enterprises an average of US$15.3 million annually. That figure will multiply without proper preparation.

How a financial institution got ahead of the 47-day certificate era

A global financial services firm I worked with successfully prepared for this shortened certificate lifecycle through a comprehensive transformation. The firm started with more than 50,000 certificates that they managed through manual processes, facing frequent outages and security concerns.

Through a methodical approach involving discovery, automation, integration, and governance, the financial services firm was able to:

  • Reduce certificate-related outages by 98%

  • Cut certificate issuance time from days to minutes

  • Establish cryptographic agility across critical systems

  • Integrate fully with Zero Trust initiatives

For the financial institution, this transformation fundamentally changed how the firm viewed and managed digital trust. By shifting from manual, reactive processes to a fully automated, policy-driven approach, they turned certificate management from a recurring risk into a strategic advantage.

Their experience shows that organizations that act early not only mitigate the operational risks of shorter certificate lifecycles but also build a more resilient and agile security posture that will carry them reliably into the 47-day certificate era.

A guide to preparing for the 47-day era

The CA/Browser Forum's SC-081v3 will shrink certificate validity to a mere 47 days, so organizations will need to implement robust automation, apply instrumentation, and embrace cryptographic agility — all while integrating certificate management into a broader security strategy.

To help you do all those things, I’ve created a quick guide to improving your security posture in preparation for the 47-day era.

Implementing the 4 pillars of certificate automation

Let’s start by implementing the four pillars of certificate automation.

  1. Automate the lifecycle

  2. Move to API-based certificate procurement

  3. Integrate with infrastructure as code for certificate deployment

  4. Monitor and validate continuously

Automate the lifecycle 

Start with an enterprise-grade certificate lifecycle automation platform. Modern certificate management platforms offer comprehensive capabilities that transform manual, error-prone processes into streamlined, policy-driven workflows.

A good certificate lifecycle automation platform provides:

  • Continuous certificate discovery and inventory

  • Automated certificate provisioning and deployment

  • Proactive renewal management

  • Streamlined revocation handling

  • Compliance reporting and auditing

 

Move to API-based certificate procurement

Transition all certificate procurement to API-based methods. Most certificate authorities (CAs) now support the Automatic Certificate Management Environment (ACME), popularized by Let's Encrypt. This protocol allows secure and seamless certificate operations.

API-based certificate procurement allows you to:

  • Integrate ACME clients for automated validation and issuance

  • Connect RESTful APIs with commercial CAs

  • Implement webhooks for event-driven processes

  • Develop custom integrations for legacy systems

Resources for API-based certificate management include:

 

Integrate with infrastructure as code for certificate deployment

Incorporate certificate management into your infrastructure as code (IaC) practices.

Managing certificates using code-enabled resources dramatically improves consistency and auditability.

IaC capabilities include:

  • Provisioning certificates using Terraform modules to ensure consistent deployment across environments

  • Automating certificate rotation with Ansible playbooks to minimize manual effort and human error

  • Streamlining approvals and deployments with GitOps workflows that fit your existing DevOps practices

  • Integrating certificate management into CI/CD pipelines to ensure reliable release cycles

Useful resources include:

 

Monitor and validate continuously

Implement real-time certificate monitoring across your environment. With shrinking certificate lifecycles, proactive monitoring will be mission critical.

Continuous monitoring and validation allow you to:

  • Monitor certificate transparency logs to detect unauthorized or unexpected certificates 

  • Enable multichannel alerts to warn of upcoming expirations proactively 

  • Conduct automatic validation and configuration checks to catch errors before they impact users 

  • Track revocation status in real time to ensure only trusted certificates remain active

Monitoring solutions to consider include:

Enhancing your security posture

Now, we can move on to enhancing security. The transition to shorter certificate lifecycles creates an opportunity to strengthen overall security. Here's how:

  • Develop a cryptographic agility strategy

  • Integrate Zero Trust architecture

  • Implement certificate transparency and governance

  • Develop incident response for certificate compromises

 

Develop a cryptographic agility strategy

Develop a cryptographic agility strategy to facilitate algorithm transitions.

With the industry moving from RSA encryption toward elliptic curve cryptography (particularly P-384), organizations need to do the following to adapt quickly:

  • Document all cryptographic implementations across your organization

  • Configure systems to support multiple algorithms simultaneously

  • Establish clear migration pathways and testing frameworks

  • Create timelines for deprecating outdated cryptographic methods

Resources for crypto agility include:

 

Integrate Zero Trust architecture

Use certificates as a cornerstone of Zero Trust security architecture.

The increased frequency of certificate validation aligns perfectly with the following Zero Trust principles:

  • Expand certificate use for user and device authentication

  • Deploy mutual TLS (mTLS) for all internal service communications

  • Tie access controls to certificate attributes

  • Implement just-in-time certificate issuance

Helpful Zero Trust resources include:

 

Implement certificate transparency and governance

Implement comprehensive governance around certificate issuance and use.

These improved visibility and control strategies enhance security:

  • Develop detailed policies for certificate types, algorithms, and key lengths

  • Establish clear guidelines for which CAs can be used

  • Actively monitor certificate transparency logs for unauthorized certificates

  • Implement fine-grained control over certificate requests and approvals

Certificate governance resources include:

 

Develop incident response for certificate compromises

Develop specific incident response procedures for certificate-related events.

As certificates become more dynamic, you must adapt incident response to:

  • Establish clear procedures for emergency certificate revocation

  • Develop capabilities for rapid certificate rotation

  • Prepare stakeholder communications for certificate incidents

  • Regularly practice certificate compromise scenarios

Ready or not, here it comes

The 47-day certificate era is coming, whether we're ready or not. Organizations that view this change as a strategic opportunity rather than just a compliance burden will gain a significant advantage.

By investing in robust automation, governance, and integration, forward-thinking companies will establish digital trust at scale, creating a competitive edge in an increasingly security-conscious market.

Additional resources 

Oct 16, 2025

Brian Fahey

Written by

Brian Fahey

Brian Fahey is a Senior Manager in Product Management at Akamai.

Tags

Share

Related Blog Posts

Cloud
A Pre-Built CNCF Pipeline: From Git to Running on Kubernetes
November 21, 2025
Confused by the complexity of Kubernetes? Read how App Platform works and how it streamlines the path from commitment to production.
Cloud
What’s Next for Akamai’s Cloud Computing Strategy
February 14, 2024
Understand Akamai’s strategy to build the world’s most distributed cloud computing platform to power and protect edge-native applications.
Cloud
Why VM Shapes Matter: New Compute Plans Deliver Predictable Performance
January 09, 2026
Get the details on Akamai’s new VM shapes and why they matter for customers.