February 2026

AWS Certificate Manager Shortens Certificate Lifetimes: What It Means for Your Cloud Security Strategy

On February 18, 2026, AWS announced an important update to AWS Certificate Manager (ACM) that aligns public TLS certificate lifetimes with new industry-wide security standards.

Read the official announcement

This change reflects a broader shift across the web toward shorter-lived certificates, stronger automation, and reduced exposure to key compromise.


🔐 What Changed?

AWS Certificate Manager now issues public certificates with a maximum validity of 198 days, replacing the previous 395-day validity period

This update ensures compliance with the CA/Browser Forum mandate requiring certificate lifetimes to be no longer than 200 days starting March 15, 2026

Key Highlights

  • New certificates: Automatically issued with a 198-day validity by default. 
  • Existing certificates: Continue to work until they expire or renew—no manual changes required. 
  • Renewals: ACM automatically renews certificates 45 days before expiration under the new model. 
  • Legacy 395/398-day certs: Renew normally, then switch to the 198-day lifecycle. 

➡️ In short: No action is required from customers—ACM handles the transition seamlessly. 


📉 Pricing Adjusted to Match Shorter Lifetimes

Because certificates now live for roughly half as long, AWS reduced pricing for exportable public certificates:

Certificate TypeOld PriceNew Price
FQDN Certificate$15$7
Wildcard Certificate$149$79

These lower prices reflect the reduced validity window while keeping automated lifecycle management intact. 


🛡️ Why the Industry Is Moving to Shorter Certificate Lifetimes

Although this update is operationally small, it represents a significant evolution in TLS security philosophy.

1. Reduced Risk Window

If a private key is compromised, a shorter certificate lifetime limits how long attackers can exploit it.

2. Encouragement of Automation

Modern PKI assumes automated issuance and rotation rather than manual certificate management—something ACM already abstracts away.

3. Alignment With Zero-Trust Principles

Frequent credential rotation is a core tenet of Zero Trust architectures, making short-lived certificates a natural fit.

4. Standardization Across Browsers and CAs

The CA/Browser Forum mandate is an ecosystem-wide move—not AWS-specific—ensuring consistent security baselines across providers. 


⚙️ What This Means for AWS Customers

If You Already Use ACM (Most Users)

You’ll likely notice no operational difference:

  • Certificates still auto-renew.
  • Integrations with services like ALB, CloudFront, and API Gateway remain unchanged.
  • Deployment workflows do not need modification.

If You Export Certificates

Plan for:

  • More frequent renewal cycles.
  • Updated cost modeling (now cheaper per certificate).
  • Ensuring downstream systems expect shorter validity periods.

If You Manage Certificates Manually Elsewhere

This announcement is a signal to accelerate automation—manual rotation every ~6 months is not sustainable.


📊 Operational Impact Snapshot

AreaBeforeAfter
Default Validity395 days198 days
Renewal Timing~60 days prior (legacy)45 days prior
CompliancePre-mandateCA/B Forum aligned
Customer Action NeededSometimesNone
Exportable Cert CostHigherReduced

🚀 Strategic Takeaway

This change isn’t just a technical adjustment—it’s part of a broader movement toward ephemeral trust models in cloud security.

Organizations that:

  • Automate certificate lifecycle management
  • Treat credentials as short-lived assets
  • Integrate renewal into CI/CD and infrastructure pipelines

…will be best positioned for the next wave of PKI modernization.


✍️ Final Thoughts

AWS Certificate Manager’s shift to 198-day certificates demonstrates how cloud platforms are quietly enforcing stronger security hygiene across the internet. With automation handling the heavy lifting, customers gain improved security posture without additional operational burden.

Honored to Be a 2026 Omnissa Tech Insider (Year Two!)

I’m incredibly grateful to share that I’ve been selected once again as part of the 2026 Omnissa Tech Insiders —my second year in this inspiring community.

This year’s cohort brings together an exceptional group of professionals with deep experience across AI, cloud, security, developer tools, and beyond. The diversity of perspectives, real-world impact, and accomplishments across the group truly impressed me.

Being part of this community has been both energizing and humbling—learning from peers, exchanging ideas, and contributing to conversations that are shaping the future of technology. I’m proud to stand alongside such talented individuals and excited about what lies ahead.

A huge thank you to the Omnissa team and to everyone in this cohort. Congratulations to all the 2026 Tech Insiders—I’m looking forward to another great year of collaboration and growth.

👏

👉 View the full announcement here: https://lnkd.in/etxzrcVS