Back to Guides
CertificatesCompliance

Certificate Revocation Requirements: What CAs Must Do (And When)

The CA/Browser Forum rules that determine how quickly certificates must be revoked - and what happens when CAs don't comply

12-15 min readJanuary 2026CA/B Forum
Certificate revocation requirements - CA timelines and rules
PKI Pro Quick Scan

Already know PKI? Here's the summary:

  • 1.24h/5d tiers - Key compromise = 24h MUST; BR violations = 24h SHOULD, 5d MAX (BR 4.9.1.1)
  • 2.OCSP/CRL lag - Tune maxAge/nextUpdate; default 4-24h caching delays effective revocation
  • 3.Mass revocation - CAs must have documented plans per SC088/SC089 direction
  • 4.CA selection - Check CCADB incident history; multi-CA strategy mitigates distrust risk
  • 5.Migration prep - Pre-establish backup CA relationships; test issuance quarterly

Why Revocation Timelines Matter

When a certificate needs to be revoked, every hour counts. A compromised certificate in the wild means attackers can impersonate your website, man-in-the-middle attacks become possible, and your users' data is at risk.

The CA/Browser Forum Baseline Requirements establish strict timelines for when Certificate Authorities must revoke certificates. These aren't suggestions - they're requirements that CAs agree to follow as a condition of being trusted by browsers.

The Entrust Example

In 2024, Entrust was distrusted by Chrome, Safari, and Firefox. One of the key issues? They refused to revoke certificates within the required timeframe, arguing the rules were wrong. The browsers disagreed.

Entrust is now effectively dead for public TLS.

Read the full Entrust case study

The Two-Tier Timeline

Tier 1MUST Revoke Within 24 Hours(BR 4.9.1.1)

These situations require immediate action. The CA has no discretion.

ScenarioWhy It's UrgentCRL Reason Code
Subscriber requests revocationOwner wants it deadunspecified (0)
Private key compromise confirmedAttackers may have the keykeyCompromise (1)
Private key compromise suspectedCan't take the riskkeyCompromise (1)
Certificate obtained through fraudNever should have been issuedaffiliationChanged (3)
Domain validation no longer reliableCA can't verify ownershipaffiliationChanged (3)
Certificate used for malware/phishingActive harm to usersaffiliationChanged (3)
CA's private key compromisedAll certs from that CA affectedcACompromise (2)
Certificate contains false informationMis-issuanceaffiliationChanged (3)
Key Point

"Suspected" compromise triggers the same 24-hour requirement as confirmed compromise. CAs can't wait for proof.

What Counts as "Suspected Compromise"?

  • HSM audit anomaly - Unexpected key access patterns or failed authentications in logs
  • Server breach in scope - Attacker accessed a server where the private key existed, even if key access isn't proven
  • Key exfiltration confirmed - Clear evidence the key was copied off-system (treat as confirmed, not suspected)

The difference matters for your incident report, but both trigger the 24-hour clock.

If Tier 1 applies: Follow the Key Compromise Response Runbook

Tier 2SHOULD Revoke in 24h, MUST Within 5 Days(BR 4.9.5)

These situations allow slightly more time, but 5 days is the absolute maximum.

ScenarioWhy 5 Days MaxCRL Reason Code
Material breach of subscriber agreementSubscriber violated termsaffiliationChanged (3)
Certificate doesn't comply with Baseline RequirementsTechnical non-complianceunspecified (0)
Domain name no longer legally permittedLegal/regulatory issueaffiliationChanged (3)
Wildcard used for fraudulent purposesAbuse of wildcard scopeaffiliationChanged (3)
Material change in certificate informationInfo no longer accurateaffiliationChanged (3)
CA determines certificate wasn't properly issuedProcess failureunspecified (0)
The 5-Day Rule Controversy

This is where Entrust got into trouble. When 26,000+ EV certificates were mis-issued, the 5-day rule meant they all needed to be revoked quickly. Entrust argued this was unreasonable for their customers. The browsers said rules are rules.

If Tier 2 applies: Follow the CA Migration Runbook if your CA is non-compliant, or the PKI Compliance Checklist for internal audit.

What "Revocation" Actually Means

Revocation isn't just flipping a switch. It's a process with multiple components:

Step 1CA Marks Certificate as Revoked

The CA updates their internal database to flag the certificate.

Step 2CRL Update

The Certificate Revocation List must be updated. Per Baseline Requirements, CRLs must be updated at least every 7 days. For urgent revocations, CAs should update immediately. CRL entries include the revocation date and reason code.

Step 3OCSP Response Update

Online Certificate Status Protocol responders must return "revoked" status. OCSP responses are typically cached. The nextUpdate field determines how long the "good" status is cached. Maximum OCSP response validity is 10 days.

The Caching Problem

Even after revocation:

  • • Browsers may have cached a "good" OCSP response
  • • CDNs may have cached the OCSP response
  • • OCSP stapling means servers may serve stale responses

This is why prevention beats revocation - once a certificate is compromised, damage may occur during the revocation propagation window.

OCSP/CRL Cache Tuning Recommendations

SettingTypical DefaultRecommendation
OCSP maxAge4-24 hours4 hours or less for high-security
OCSP nextUpdate1-7 days24 hours max
CRL cache lifetime7 days24-48 hours for leaf certs
OCSP staple refreshAt cert renewalEvery 4-12 hours

Note: Some public CAs still default to long CRL lifetimes (7+ days). Check your CA's CPS for their actual values.

Learn more about CRL, OCSP, and stapling

Your Obligations as a Subscriber

Certificate holders have responsibilities too. When you get a certificate, you agree to report compromise immediately.

You must notify your CA within 24 hours if:

  • • Your private key is compromised or suspected compromised
  • • Information in the certificate is no longer accurate
  • • The certificate is being misused

How to Report to Major CAs

CARevocation MethodResponse Time
DigiCertPortal or support@digicert.comUsually < 1 hour
SectigoPortal or revoke@sectigo.comUsually < 4 hours
Let's EncryptACME revoke endpoint or certbotImmediate (automated)
GlobalSignPortal or supportUsually < 2 hours
Pro Tip

Know your CA's revocation process BEFORE you need it. During an incident is not the time to figure out how to contact them.

What to Include in a Revocation Request

  1. 1.Certificate serial number
  2. 2.Domain name(s) on the certificate
  3. 3.Reason for revocation
  4. 4.Your authorization (account login or challenge)
Key Compromise Response Runbook

When CAs Can Delay Revocation

The Baseline Requirements do allow CAs to delay revocation in limited circumstances.

Permitted Delays
  • Ongoing investigation - CA may delay up to 24 hours to investigate validity of report
  • Coordination with law enforcement - In cases involving active criminal investigation
  • Preventing greater harm - If immediate revocation would cause disproportionate harm (rarely accepted)

Mozilla's framing: Delays are only acceptable for "exceptional circumstances" where there would be "significant harm" - and browsers still expect documented, time-bounded plans, not open-ended delays.

NOT Valid Reasons
  • "Our customer needs more time"
  • "It's a holiday weekend"
  • "We disagree with the rule"
  • "The impact would be too large"
  • "We're too busy"

This is exactly where Entrust went wrong. They prioritized customer convenience over compliance. Browsers made clear: the rules apply equally to everyone.

The Compliance Enforcement Chain

CA/Browser Forum
Sets Requirements
Root Programs (Chrome, Mozilla, Apple, Microsoft)
Enforce Requirements
Certificate Authorities
Must Comply or Face Distrust
Your Certificates
Stop Working if CA Distrusted
Your Users
See Security Warnings
Key Insight

The CA/Browser Forum has no direct enforcement power. It's the browser root programs that actually enforce compliance by threatening (and executing) distrust.

Recent Enforcement Actions

CAYearIssueConsequence
Entrust2024Pattern of compliance failures including revocation delaysDistrusted by Chrome, Safari, Firefox
Symantec2017Mass mis-issuance, compliance failuresSold to DigiCert, gradual distrust
WoSign/StartCom2016Backdating certificates, lying to browsersFully distrusted
DigiNotar2011Hacked, issued fraudulent Google certsBankrupt within weeks
PKI Disasters Hall of Fame

Practical Implications for PKI Teams

1Choose Your CA Wisely

PKI/Infra

Check your CA's compliance history by:

  • • Reviewing CCADB incident reports
  • • Looking for patterns of delayed revocations
  • • Monitoring browser security blogs for warnings
Compliance Hub

2Build Revocation into Your Incident Response

Security Ops

Your incident response plan should include:

  • • CA contact information (not behind a support queue)
  • • Certificate serial numbers for all production certs
  • • Pre-authorized contacts who can request revocation
  • • Replacement certificate procurement process
  • • Deployment runbook for emergency replacement

3Understand Your Exposure

App Teams

If your CA gets distrusted (like Entrust):

  • • Existing certificates may continue working until expiry
  • • New certificates won't be trusted
  • • Any renewal/rekey creates a distrusted certificate
  • • You need to migrate to a new CA
CA Migration Runbook

4Consider Multi-CA Strategy

PKI/Infra

Don't put all your certificates in one basket:

  • • Use different CAs for different environments
  • • Have backup CA relationships established
  • • Test certificate issuance from backup CA periodically

5Plan for Mass Revocation Events

Security Ops

Per CA/Browser Forum direction (SC088/SC089), CAs must have documented mass-revocation plans:

  • • Know your CA's mass-revocation communication process
  • • Ensure your cert management can handle bulk replacements
  • • Test automation scripts at scale (not just single-cert renewals)
  • • Have monitoring for revocation status of all certs

The Regulatory Landscape

Revocation requirements come from multiple sources:

CA/Browser Forum Baseline Requirements

The primary source. Section 4.9 covers revocation in detail.

  • • 24-hour revocation for critical issues
  • • 5-day maximum for other issues
  • • CRL/OCSP update requirements

Browser Root Program Requirements

Each browser can add additional requirements:

  • Chrome Root Program: Additional transparency requirements
  • Mozilla Root Program: Public incident reporting required
  • Apple Root Program: Specific OCSP requirements
  • Microsoft Root Program: Additional auditing requirements

Industry Standards

  • WebTrust for CAs: Audit requirements include revocation procedures
  • ETSI EN 319 411: European requirements for qualified certificates
  • PCI DSS: May require revocation capability for payment systems
PKI Compliance Checklist
Private CA vs Public CA: Know the Difference

Everything in this guide applies to publicly-trusted CAs bound by browser root programs. Internal enterprise CAs operate under different rules:

Public CA (DigiCert, Let's Encrypt, etc.)
  • • Must follow BR timelines
  • • Subject to browser enforcement
  • • Audited by WebTrust/ETSI
Private CA (AD CS, Vault, AWS PCA)
  • • Governed by org policy
  • • Can be stricter or looser
  • • Internal audit only

Best practice: Adopt BR-like timelines for private CAs too. Consistency reduces confusion during incidents.

Frequently Asked Questions

Can I revoke my own certificate without going through the CA?

No. Only the CA can add a certificate to the CRL or update OCSP responses. You can request revocation, but the CA must execute it.

What if my CA refuses to revoke my certificate?

This would be a serious compliance violation. Document everything and report to the browser root programs. In practice, reputable CAs always honor subscriber revocation requests.

How do I verify a certificate has been revoked?

Use OpenSSL to check OCSP:

openssl ocsp -issuer chain.pem -cert certificate.pem \
  -url http://ocsp.example.com -resp_text

Or check the CRL:

openssl crl -in crl.pem -text -noout | grep "Serial Number"

Does revocation affect other certificates?

No. Each certificate is independent. Revoking one certificate doesn't affect others, even from the same CA.

What's the difference between revocation and expiration?

Expiration is the natural end of certificate validity (planned). Revocation is premature termination of trust (unplanned). Both result in the certificate no longer being trusted, but revocation implies something went wrong.

Are there any certificates that can't be revoked?

Technically, self-signed root certificates in trust stores can't be "revoked" in the traditional sense - they must be removed from trust stores directly. This is why root key compromise is catastrophic.

How do mass revocation events work?

When a CA must revoke thousands of certificates (like Entrust's EV mis-issuance), the same timelines apply. CAs are expected to have documented mass-revocation plans that can handle volume. They typically batch-notify affected subscribers and stagger issuance of replacements, but the 5-day deadline is non-negotiable. Recent CA/Browser Forum discussions (SC088/SC089) emphasize CAs must demonstrate mass-revocation readiness during audits.

What if only some SANs on my certificate are affected?

The entire certificate must be revoked. Certificates are atomic - you can't selectively revoke individual Subject Alternative Names (SANs). If one domain on a multi-SAN certificate is compromised or no longer under your control, the whole certificate must go. This is why some organizations prefer single-domain certificates for critical services despite the management overhead.

Do these rules apply to internal/private CAs?

Not directly. The Baseline Requirements only bind publicly-trusted CAs that are in browser root programs. Internal enterprise CAs (like those run on Microsoft AD CS or HashiCorp Vault) are governed by your organization's policies, which can be stricter or more lenient. However, best practice is to adopt similar timelines - if 24 hours is good enough for the internet, it should be good enough for internal systems. See AWS Private CA revocation docs for an example private CA approach.

Key Takeaways

  1. 124 hours - Time limit for revoking compromised or fraudulently-obtained certificates
  2. 25 days - Maximum time for all other revocation scenarios
  3. 3No exceptions - CAs that don't comply face distrust (see: Entrust)
  4. 4Your responsibility - Report compromises within 24 hours
  5. 5Revocation propagates - CRL/OCSP updates take time; prevention beats cure
  6. 6Monitor your CA - Their compliance history affects your certificates

Related Content