Google’s 90-Day TLS Certificate Limit: What Does It Mean?

Google search bar and coloured shield graphics - Google’s 90-Day TLS Certificate

Google’s announcement to reduce the lifespan of Transport Layer Security (TLS) certificates from 398 days to 90 days continues to be a hot topic of discussion among information security professionals. Especially those directly involved in replacing and updating certificates. It’s particularly frustrating because, although proposed in April 2023, there is still no confirmed date for its implementation. However, Chrome browsers account for just over 50% of all UK web traffic (Statista), so there is no avoiding the impact that this will have.

 

Why is it happening and why is it important for cyber security?

The longer an SSL/TLS certificate is valid, the less reliable it becomes. Until recently, a certificate could remain valid for up to 5 years. However, companies are bought and sold, website ownership or management is transferred, and directors change.

Google’s 90-day TLS Certificate validity is part of a broader effort to enhance internet security and protect online reputations. Websites must be trustworthy to retain consumer confidence in e-commerce and data protection. Shorter certificate lifespans significantly reduce the risk of compromised certificates and ensure that cryptographic standards are updated more frequently.

There’s no doubt it’s a positive move and will protect your cyber posture. However, as with all major enforced changes, Google’s 90-day TLS Certificate limit should be prepared for as a fundamental change in the way you manage your certificates in the future.

 

When will the change take place, and are there more changes to come?

No one outside of Google seems to know. It was originally scheduled to take effect in April 2024 but this seems to have been pushed back to September 2024 at least. Google is strongly committed to its 90-day cybersecurity response window and has already implemented a 90-day disclosure deadline for vulnerability disclosures. Therefore, it is highly likely that the certificate lifespan reduction will occur soon.

Our CTO Chris Templeton told me: “There’s also speculation in the cyber community that this is the thin end of the wedge and that an even shorter lifespan limit will follow. This would be best practice because the longer a certificate stays around, the greater the cyber security risk. Right now, though, most organisations are ill prepared for the increased workload either lifespan reduction would entail.”

In our opinion, the answer is Automated Certificate Management. Once that is in place, the renewal window becomes irrelevant.

 

Preparing for the Change; 5 Key Steps

We might not know when this will happen, but preparing in advance offers immediate benefits for your cyber posture and process management that go beyond what Google is planning.  Here are some critical actions to consider:

  1. Implement Automated Certificate Management

Automating the management of certificate renewals is crucial due to their increased frequency. It’s important to invest in automated certificate management solutions that can handle the entire lifecycle of your certificates, from discovery and issuance to renewal and revocation. Automated systems can significantly reduce the risk of human error and ensure timely renewals, minimising the chances of unexpected expirations and outages.

  1. Conduct a Comprehensive Certificate Audit

Perform a thorough audit of all certificates across your organisation. Identify legacy wildcard certificates and assess their necessity and security implications. This audit will provide a clear picture of your certificate landscape and help you prioritise renewal efforts.

  1. Enhance Visibility and Monitoring

Implement tools that offer real-time visibility and monitoring of your certificate estate. Continuous monitoring can alert you to impending expirations and potential vulnerabilities, allowing you to address issues before they escalate into significant problems.

  1. Educate and Train Your Team

Ensure that your security and IT teams are well-informed about the upcoming changes and their implications. Provide training on the use of automated management tools and the importance of maintaining robust certificate practices. A well-prepared team is essential for a smooth transition to the new 90-day certificate regime.

  1. Collaborate with Trusted Security Partners

Certificate management is a specialised and relatively new area of expertise. Partnering with a cybersecurity specialist to implement certificate automation or to review your processes before the 90-day limit arrives can streamline the implementation process and ensure that the change is seamlessly integrated into your team’s existing processes.

 

FullProxy’s cyber specialists partner with AppViewX to implement a full suite of certificate management automation solutions. Ask for a no-obligation demo today.

Ewan Ferguson
Chief Executive Officer
In the rapidly evolving world of network infrastructure, staying current is not just a best practice—it’s a necessity. For F5 users, this means keeping your BIG-IP systems up to date with the latest supported versions. You can find out if you're due for a an upgrade with our bespoke F5 Software Countdown!
The IT and Cyber Security landscape has undergone significant changes in recent years. One prominent change is Citrix shifting their focus from the load-balancing space to more towards other areas, as evidenced by acquisitions like Wrike, a project management company, and the end-of-sale announcement for NetScaler Perpetual Licenses.
Certificate management is a critical part of an organisation’s cyber security that cannot be ignored. Certificates are vital for protecting data transmitted between websites and users. If not properly managed, data could be at significant risk. One certificate option that organisations often consider is wildcard certificates, which provide some benefits but also carry security risks.
Meet Donald, our experienced Technical Manager. In this blog post, he takes us through a quick demonstration of F5's Distributed Cloud, showcasing how effortlessly you can ensure maximum uptime and protection for your web applications.