47-Day Readiness Audit Checklist
What breaks in your environment when certificate velocity increases 8x? Find out before March 2026. A structured, phase-by-phase self-audit that helps organizations answer: when 47-day certificates arrive, what breaks?
When to Use
- • Annual or quarterly 47-day readiness assessment
- • After reading the PKI Automation Gap guide — "what do I do now?"
- • Preparing a readiness report for leadership or board
- • Evaluating CLM vendor claims against your actual environment
- • Before Phase 1 (March 2026) takes effect
Do NOT Use For
- • General PKI compliance (use PKI Compliance Checklist)
- • Emergency certificate replacement (use Emergency Runbook)
- • Single certificate renewal (use Certificate Renewal Runbook)
- • Private/internal PKI assessment (47-day applies to public TLS only)
Quick Reference (TL;DR)
- Know every public TLS cert you own, who renews it, and whether that process is fully automated end-to-end
- Test at 2x velocity now (Phase 1). Fix what breaks before 8x velocity arrives (Phase 3)
- The 10-day DCV reuse limit in Phase 3 is harder than the 47-day validity — plan DNS-01 automation first
- If any renewal requires a human clicking something, that's your #1 risk
1Scope & Inventory Audit
Objective: Confirm you know exactly how many publicly-trusted TLS certificates you own and where they live
💡 Your CLM tool's inventory and your actual inventory are different numbers. CT logs are the truth source for public certs.
💡 Shadow certificates are the #1 discovery gap. Developers provisioning Let's Encrypt certs in CI/CD pipelines won't show up in Venafi or Keyfactor unless you've configured discovery for those environments.
💡 Don't forget DR/failover sites — they often have certificates that only get attention during an actual failover.
2Renewal Ownership Audit
Objective: For every certificate in your inventory, confirm there is a defined owner and a defined renewal method — manual or automated
💡 "Semi-automated" means "manual" when it matters. If a human has to click "approve" at 3 AM on a weekend, it's manual.
💡 The honest split for most enterprises is 20–40% automated, 60–80% manual. If your number is higher than 50% automated, double-check — you may be counting "auto-renew enabled in the CA portal" as automation when deployment is still manual.
3Domain Control Validation (DCV) Readiness
Objective: Assess whether your DCV methods survive the shift to 10-day reuse in Phase 3. This is harder than the 47-day headline
💡 The 10-day DCV reuse window (8 days effective) means ~35 domain validations per cert per year in Phase 3. If any of those require a human, your pipeline is broken.
💡 DNS-01 is the most flexible method and the only one that works for wildcards. Prioritize DNS-01 automation above all else.
💡 If you manage DNS through a ticketing system ("open a ticket to create a TXT record"), that's a human dependency that won't scale.
4ACME & Issuance Pipeline
Objective: Verify your certificate issuance pipeline can handle 8x throughput without breaking
💡 Let's Encrypt rate limits: 50 certificates per registered domain per week. At 500 certs on 47-day rotation, that's ~40 renewals/week — you're fine. But burst renewals after a mass expiry could hit limits.
💡 "Works in dev, breaks in prod at scale" is the most common issuance pipeline failure. Test with realistic volume.
💡 If you use a CLM (Venafi, Keyfactor, DigiCert Trust Lifecycle, Sectigo SCM), verify that its ACME connector actually works for your environment — many CLMs have ACME support that's technically available but not production-tested in your specific deployment.
5Deployment Automation
Objective: This is where most "automated" pipelines fail. The cert renews, but never actually gets deployed
💡 Deployment is the #1 failure point in certificate automation. The renewal succeeds, the new cert sits in a directory, and nobody notices until the old cert expires and the site goes down.
💡 F5 BIG-IP is notoriously difficult to automate for cert deployment. If you have F5s, this is probably your biggest single risk area.
💡 "The CDN handles it" is only true if you've verified it. Cloudflare and AWS managed certs auto-renew. Custom certs uploaded to CDNs do NOT auto-renew.
6Monitoring & Alerting
Objective: Can you detect and respond to a failed renewal before the certificate expires?
💡 At 47-day validity with renewal at day ~30, you have roughly 17 days between "renewal should have happened" and "certificate expires." That's your entire response window.
💡 The most important alert isn't "cert expiring soon" — it's "renewal attempted and failed." By the time you get an expiry alert, you've already lost time.
💡 If your monitoring only checks certificate expiry dates and not pipeline health, you're monitoring the symptom, not the cause.
7Phase 1 Specific Readiness (March 15, 2026)
Objective: Confirm you're ready for 200-day (199 effective) validity. This is the dress rehearsal
💡 Phase 1 is your free trial for automation. If anything breaks at 2x throughput, you have time to fix it before 4x (Phase 2) and 8x (Phase 3).
💡 Sectigo starts enforcing 199-day max on March 12, 2026 — 3 days early for safety margin. Check your CA's specific enforcement date.
8Organizational Readiness
Objective: Technology is half the problem. The other half is people and process
💡 Frame this to leadership as infrastructure modernization, not a PKI project. "Certificate automation readiness" gets a shrug; "preventing the next certificate outage that takes down production" gets budget.
💡 The exception list is the most important output. Every cert on the exception list is a cert that will cause an outage in 2029 if you don't have a plan.
9Readiness Scoring & Next Steps
Objective: Summarize your audit into a defensible readiness score and plan next actions
💡 Your readiness percentage is auto-calculated from all checked items in Sections 1–8. Use the progress bar at the top of this page as your readiness score.
💡 **Scoring guide:** 90–100% = ✅ Ready (automation in place, monitoring works, team prepared) | 70–89% = 🟡 On Track (core automation exists, gaps known and being addressed) | 50–69% = 🟠 At Risk (significant manual dependencies remain, timeline tight) | Below 50% = 🔴 Critical (major gaps — immediate action needed)
💡 Focus on Section 5 (Deployment) and Section 3 (DCV) first — these are the hardest to fix and the most common failure points.
Troubleshooting
Problem: We don't have a complete certificate inventory
Solution: Start with Certificate Transparency logs (crt.sh) for your domains — this shows every publicly-trusted cert ever issued. Combine with Nmap scanning of your external IP ranges. This gives you 80% coverage in a day. See the [Certificate Discovery Guide](/guides/certificate-discovery) for step-by-step instructions.
Problem: We have hundreds of certificates managed by different teams with no central process
Solution: This is the most common situation. Start by classifying certificates into tiers: Tier 1 (revenue-impacting), Tier 2 (internal-facing but important), Tier 3 (dev/test). Automate Tier 1 first. See the [PKI Automation Gap](/guides/pki-automation-gap) guide for the full prioritization framework.
Problem: Our DNS is managed by a separate team and we can't get API access
Solution: This is a political problem, not a technical one. DNS-01 automation requires API access — there's no workaround. Escalate with the business case: "Without DNS API access, we cannot automate certificate validation, which means manual intervention ~35 times per cert per year by 2029." Consider delegated DNS zones (CNAME to an automation-controlled zone) as a compromise.
Problem: We use F5 BIG-IP and cert deployment is manual through the GUI
Solution: F5 supports iControl REST API for certificate management, but it's complex. See the [F5 SSL Certificate Checklist](/checklists/f5-certificate-checklist) for current guidance. This is a known pain point — budget time and potentially vendor PS hours for this.
Problem: Leadership doesn't see this as urgent — "2029 is years away"
Solution: Phase 1 is March 2026 (weeks, not years). Frame it as: "Our first test is in days. If automation fails at 2x throughput, it will definitely fail at 8x. We need to find out now, not in 2029." Use the [Compliance Hub](/guides/compliance-hub) countdown timers as visual evidence.