SSL/TLS Certificate Expiry Risk Calculator
Evaluate the risk score and estimated business impact of an expiring SSL/TLS certificate based on days remaining, site traffic, and system criticality.
Formulas Used
1. Urgency Score (U)
U = 100 × e−λ × days, where λ = 0.05
Exponential decay model: urgency approaches 100 as days → 0 (expired), and decays toward 0 for distant expiry dates. Half-life ≈ 14 days.
2. Exposure Mitigation Factor (M)
M = 1 − (0.5 × autoRenewal) − (0.5 × monitoring)
M ∈ [0, 1]. Auto-renewal and monitoring each contribute up to 50% risk reduction. M = 0 means fully mitigated; M = 1 means no controls.
3. Composite Risk Score (R)
R = min([(U × criticality × M) / 400] × 100, 100)
Normalised to 0–100. Maximum raw risk = 100 × 4 × 1 = 400 (expired, critical, no controls).
4. Daily Revenue at Risk (DRR)
DRR = visitors × revenue_per_visitor × P_impact, where P_impact = U / 100
P_impact is the probability that the expiry event causes a full service disruption, proxied by the urgency score.
5. Remediation Window Cost (RWC)
RWC = DRR × expected_downtime_days
Expected downtime: 0.5 days (auto-renewal active), 1 day (partial), 3 days (manual renewal).
Assumptions & References
- Maximum certificate validity is 825 days per CA/Browser Forum Baseline Requirements (reduced to 398 days for publicly trusted certs from Sept 2020).
- The exponential decay constant λ = 0.05 is calibrated so that urgency exceeds 50% at 14 days remaining, aligning with industry best-practice renewal windows (Let's Encrypt renews at 30 days; Google recommends renewal at 20 days).
- Criticality multipliers (1–4) are adapted from NIST SP 800-30 impact severity levels (Low / Medium / High / Critical).
- Mitigation factor weights (50% each for auto-renewal and monitoring) reflect OWASP guidance that automated renewal and alerting are the two primary controls for certificate expiry risk.
- Expected downtime estimates (0.5 / 1 / 3 days) are based on industry incident post-mortems: automated systems recover in hours; manual processes typically require 1–3 business days including escalation and change management.
- Revenue at risk assumes 100% of HTTPS traffic is blocked upon expiry (browsers display hard-stop warnings for expired certificates per RFC 5280 and browser security policies).
- This calculator provides a risk estimate only. Actual impact depends on browser behaviour, CDN caching, HSTS policies, and organisational response time.
- References: CA/Browser Forum Baseline Requirements v2.0; NIST SP 800-30 Rev 1; RFC 5280 (X.509); Let's Encrypt renewal documentation; OWASP Transport Layer Security Cheat Sheet.