Friday, April 11, 2025
HomeCyber Security NewsGoogle to Reduce SSL Certificate Lifespan to 90 Days

Google to Reduce SSL Certificate Lifespan to 90 Days

Published on

SIEM as a Service

Follow Us on Google News

Recently, Google declared its plan to reduce the maximum validity for public TLS (SSL) certificates from 398 to 90 days.

Under its “Moving Forward, Together” plan, Google intended to limit the maximum public TLS certificate validity to 90 days via “future policy updates or a CA/B Forum Ballot Proposal,” a small but crucial point that should be noted.

The maximum duration of a public SSL certificate has been reduced from three years to two years to one year, and now Google has said that it plans to shorten this duration to 90 days further.

- Advertisement - Google News

This 90-day maximum will probably be in place by the end of 2024, while the exact date is unknown.

The ecosystem will avoid complex, tedious, and error-prone issuing procedures by encouraging automation and adopting practices that reduce certificate lifetime. 

“Reducing certificate lifetime encourages automation and adopting practices that drive the ecosystem away from baroque, time-consuming, and error-prone issuance processes,” Google.

Google mentions that these changes will speed up the adoption of new security capabilities and best practices and promote the adaptability needed to switch the ecosystem to quantum-resistant algorithms quickly. 

Also, less reliance on “broken” revocation checking solutions that cannot fail-closed and hence provide insufficient protection will result from shorter certificate lifetimes. 

Moreover, the impact of unexpected Certificate Transparency Log disqualifications will be lessened with shorter-lived certificates.

In addition, Google intended to shorten domain validation reuse periods to 90 days.

 “More timely domain validation will better protect domain owners while reducing the potential for a CA to mistakenly rely on stale, outdated, or otherwise invalid information resulting in certificate mis-issuance and potential abuse,” Google.

Automation is Essential for Reducing Risk

It will be extremely challenging to manually manage the renewal and deployment of each server certificate more than four times each year, necessitating more than four times the effort that IT security personnel already have to do for an already challenging task.

Given that most businesses do not have a small number of certificates, this is a significant increase. It involves hundreds or thousands of certificates rather than a few dozen that must be handled four times annually.

Automation becomes even more important in this situation, especially as the duration of domain validation reuse and the lifespan of TLS/SSL certificates are decreasing.

Hence, IT managers should explore certificate automation options, such as CA agnostic Certificate Lifecycle Management (CLM) platforms. These solutions can aid in automatically provisioning and installing renewal and replacement certificates and detecting certificates in enterprise environments regardless of the Certificate Authority issuing them.

Ultimately, businesses need a way to scale up the automation of digital certificate lifecycles. Automation is essential for risk reduction.

Building Your Malware Defense Strategy – Download Free E-Book

Related Articles:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...