All In The Lab Sessions

One Expired Certificate Can Take Down Your Business. Here Is What You Need to Do Before 2029

cybersecurity CyberArk

Picture this: it is 2 a.m. on a Sunday. A TLS certificate expires on an application your business depends on. No one is watching it. No alert fires in time. By the time someone gets the call, the damage is done.

This is not a hypothetical. It is the conversation that Alchemy Technology Group and CyberArk had during the second session of Alchemy In The Lab, and it is exactly the scenario that organizations need to plan for now.

The Mandate Is Real, and the Clock Is Running

The CA/Browser Forum — the governing body that includes Microsoft, Apple, Google, and major certificate authorities — has set a hard timeline for TLS certificate lifespans. As of March 2026, all new TLS certificates carry a maximum lifespan of 200 days, down from 398. By 2029, that number drops to 47 days.

This is not a recommendation. Enforcement happens at the browser root program level. If your certificates do not comply, browsers can block access to your web portals, customer-facing applications, and any internal system with a browser-based front end. The business impact is direct and immediate.

The Math Gets Uncomfortable Fast

Shorter lifespans lead to more frequent renewals. When certificates have a lifespan of 200 days, most organizations will renew them approximately twice a year. However, with a reduced lifespan of 47 days, accounting for a buffer zone, that renewal cycle shifts to about every 40 to 42 days. This change pushes some organizations to conduct 10 to 11 renewal cycles per year for each certificate.

Here is what that means in practice. An organization managing 500 external certificates today could face up to 10,000 certificate lifecycle events by 2029. An organization with 100 certificates is looking at roughly 1,200 renewal cycles. Manual certificate management averages 3 to 5 hours per certificate, with 75 percent of that workload falling on IT and DevOps teams, not the PKI team. At 1,200 cycles, that is nearly 4,800 hours of potential work. For most teams, that number is not manageable without automation.

You Probably Have More Exposure Than You Think

Most organizations undercount their certificate inventory. The reason is classification. Over the years, many teams have labeled certificates as “internal” because they support internal applications. But if those applications have a browser-based front end, the certificates supporting them are likely covered by the CA/Browser Forum mandate.

Wildcard certificates add another layer of risk. One wildcard certificate often spans multiple machines. If that certificate expires, every machine it covers goes down. In a 47-day world, that single point of failure becomes a recurring operational risk unless organizations move toward a 1-to-1 certificate-to-machine model, which automation makes viable.

Automation Is the Only Viable Path Forward

The certificate lifecycle involves three distinct phases: enrollment, provisioning, and expiration. In most organizations, these phases are owned by different teams. That handoff structure works at 398-day cycles. It does not work at 47 days.

CyberArk’s machine identity platform automates the full lifecycle from enrollment to expiration across 300+ native integrations with AWS, Azure, Google Cloud, Citrix, Apache, Tomcat, load balancers, and SIEMs. The platform also extends to SSH key rotation, workload identities, AI identity, and code signing. For organizations already thinking about post-quantum cryptography or Kubernetes environments, that broader scope matters.

Alchemy’s role is to connect the technical problem to the business case. That means mapping your actual certificate inventory, calculating realistic workload projections, and building a roadmap that accounts for 2026 requirements and what comes after.

The Time to Act Is Now, Not 2028

The phase rollout exists specifically to give organizations time to prepare. That window is closing. Teams that start now have room to audit inventory, identify misclassified certificates, evaluate automation platforms, and build the internal case for budget. Teams that wait will be managing a wall of work under pressure.

Watch the full session, request a certificate scan, or book a strategy session to understand where your organization stands today.

Request a free certificate scan.

CyberArk’s external certificate scan is agentless and non-intrusive. It scans only publicly facing domains, requires no software installation, and returns a report on your external certificate exposure. Contact Alchemy to get started.

> Set Up your Scan Here

Book an Identity Strategy Mastermind

A complementary session with CyberArk security experts that covers both human and machine identity posture. Recommended for CIOs and CISOs evaluating where machine identity fits in their broader security strategy. Contact Alchemy to schedule.

> Set Up a Mastermind Today

More Sessions