HardChecklist

47-Day Readiness Audit Checklist

What breaks in your environment when certificate velocity increases 8x? Find out before March 2026. A structured, phase-by-phase self-audit that helps organizations answer: when 47-day certificates arrive, what breaks?

2-4 hours (initial), 1 hour (quarterly)
Last Updated: February 2026
Progress: 0/82 complete0%

When to Use

  • Annual or quarterly 47-day readiness assessment
  • After reading the PKI Automation Gap guide — "what do I do now?"
  • Preparing a readiness report for leadership or board
  • Evaluating CLM vendor claims against your actual environment
  • Before Phase 1 (March 2026) takes effect

Do NOT Use For

  • General PKI compliance (use PKI Compliance Checklist)
  • Emergency certificate replacement (use Emergency Runbook)
  • Single certificate renewal (use Certificate Renewal Runbook)
  • Private/internal PKI assessment (47-day applies to public TLS only)

Quick Reference (TL;DR)

  1. Know every public TLS cert you own, who renews it, and whether that process is fully automated end-to-end
  2. Test at 2x velocity now (Phase 1). Fix what breaks before 8x velocity arrives (Phase 3)
  3. The 10-day DCV reuse limit in Phase 3 is harder than the 47-day validity — plan DNS-01 automation first
  4. If any renewal requires a human clicking something, that's your #1 risk

1Scope & Inventory Audit

Objective: Confirm you know exactly how many publicly-trusted TLS certificates you own and where they live

💡 Your CLM tool's inventory and your actual inventory are different numbers. CT logs are the truth source for public certs.

💡 Shadow certificates are the #1 discovery gap. Developers provisioning Let's Encrypt certs in CI/CD pipelines won't show up in Venafi or Keyfactor unless you've configured discovery for those environments.

💡 Don't forget DR/failover sites — they often have certificates that only get attention during an actual failover.

2Renewal Ownership Audit

Objective: For every certificate in your inventory, confirm there is a defined owner and a defined renewal method — manual or automated

💡 "Semi-automated" means "manual" when it matters. If a human has to click "approve" at 3 AM on a weekend, it's manual.

💡 The honest split for most enterprises is 20–40% automated, 60–80% manual. If your number is higher than 50% automated, double-check — you may be counting "auto-renew enabled in the CA portal" as automation when deployment is still manual.

3Domain Control Validation (DCV) Readiness

Objective: Assess whether your DCV methods survive the shift to 10-day reuse in Phase 3. This is harder than the 47-day headline

💡 The 10-day DCV reuse window (8 days effective) means ~35 domain validations per cert per year in Phase 3. If any of those require a human, your pipeline is broken.

💡 DNS-01 is the most flexible method and the only one that works for wildcards. Prioritize DNS-01 automation above all else.

💡 If you manage DNS through a ticketing system ("open a ticket to create a TXT record"), that's a human dependency that won't scale.

4ACME & Issuance Pipeline

Objective: Verify your certificate issuance pipeline can handle 8x throughput without breaking

💡 Let's Encrypt rate limits: 50 certificates per registered domain per week. At 500 certs on 47-day rotation, that's ~40 renewals/week — you're fine. But burst renewals after a mass expiry could hit limits.

💡 "Works in dev, breaks in prod at scale" is the most common issuance pipeline failure. Test with realistic volume.

💡 If you use a CLM (Venafi, Keyfactor, DigiCert Trust Lifecycle, Sectigo SCM), verify that its ACME connector actually works for your environment — many CLMs have ACME support that's technically available but not production-tested in your specific deployment.

5Deployment Automation

Objective: This is where most "automated" pipelines fail. The cert renews, but never actually gets deployed

💡 Deployment is the #1 failure point in certificate automation. The renewal succeeds, the new cert sits in a directory, and nobody notices until the old cert expires and the site goes down.

💡 F5 BIG-IP is notoriously difficult to automate for cert deployment. If you have F5s, this is probably your biggest single risk area.

💡 "The CDN handles it" is only true if you've verified it. Cloudflare and AWS managed certs auto-renew. Custom certs uploaded to CDNs do NOT auto-renew.

6Monitoring & Alerting

Objective: Can you detect and respond to a failed renewal before the certificate expires?

💡 At 47-day validity with renewal at day ~30, you have roughly 17 days between "renewal should have happened" and "certificate expires." That's your entire response window.

💡 The most important alert isn't "cert expiring soon" — it's "renewal attempted and failed." By the time you get an expiry alert, you've already lost time.

💡 If your monitoring only checks certificate expiry dates and not pipeline health, you're monitoring the symptom, not the cause.

7Phase 1 Specific Readiness (March 15, 2026)

Objective: Confirm you're ready for 200-day (199 effective) validity. This is the dress rehearsal

💡 Phase 1 is your free trial for automation. If anything breaks at 2x throughput, you have time to fix it before 4x (Phase 2) and 8x (Phase 3).

💡 Sectigo starts enforcing 199-day max on March 12, 2026 — 3 days early for safety margin. Check your CA's specific enforcement date.

8Organizational Readiness

Objective: Technology is half the problem. The other half is people and process

💡 Frame this to leadership as infrastructure modernization, not a PKI project. "Certificate automation readiness" gets a shrug; "preventing the next certificate outage that takes down production" gets budget.

💡 The exception list is the most important output. Every cert on the exception list is a cert that will cause an outage in 2029 if you don't have a plan.

9Readiness Scoring & Next Steps

Objective: Summarize your audit into a defensible readiness score and plan next actions

💡 Your readiness percentage is auto-calculated from all checked items in Sections 1–8. Use the progress bar at the top of this page as your readiness score.

💡 **Scoring guide:** 90–100% = ✅ Ready (automation in place, monitoring works, team prepared) | 70–89% = 🟡 On Track (core automation exists, gaps known and being addressed) | 50–69% = 🟠 At Risk (significant manual dependencies remain, timeline tight) | Below 50% = 🔴 Critical (major gaps — immediate action needed)

💡 Focus on Section 5 (Deployment) and Section 3 (DCV) first — these are the hardest to fix and the most common failure points.

Troubleshooting

Problem: We don't have a complete certificate inventory

Solution: Start with Certificate Transparency logs (crt.sh) for your domains — this shows every publicly-trusted cert ever issued. Combine with Nmap scanning of your external IP ranges. This gives you 80% coverage in a day. See the [Certificate Discovery Guide](/guides/certificate-discovery) for step-by-step instructions.

Problem: We have hundreds of certificates managed by different teams with no central process

Solution: This is the most common situation. Start by classifying certificates into tiers: Tier 1 (revenue-impacting), Tier 2 (internal-facing but important), Tier 3 (dev/test). Automate Tier 1 first. See the [PKI Automation Gap](/guides/pki-automation-gap) guide for the full prioritization framework.

Problem: Our DNS is managed by a separate team and we can't get API access

Solution: This is a political problem, not a technical one. DNS-01 automation requires API access — there's no workaround. Escalate with the business case: "Without DNS API access, we cannot automate certificate validation, which means manual intervention ~35 times per cert per year by 2029." Consider delegated DNS zones (CNAME to an automation-controlled zone) as a compromise.

Problem: We use F5 BIG-IP and cert deployment is manual through the GUI

Solution: F5 supports iControl REST API for certificate management, but it's complex. See the [F5 SSL Certificate Checklist](/checklists/f5-certificate-checklist) for current guidance. This is a known pain point — budget time and potentially vendor PS hours for this.

Problem: Leadership doesn't see this as urgent — "2029 is years away"

Solution: Phase 1 is March 2026 (weeks, not years). Frame it as: "Our first test is in days. If automation fails at 2x throughput, it will definitely fail at 8x. We need to find out now, not in 2029." Use the [Compliance Hub](/guides/compliance-hub) countdown timers as visual evidence.