Hi 49885604,
I really want to cheat here and say....
Align your PKI configuration to your organisation's security policy(ies).
```I am cautious about the term "Best Practices". I ask myself, 'Best for whom?' and 'Best for what sort of environment/organisation?'
For example, in a highly automated, closely monitored (with highly tuned monitoring), robust proceedures (including calendars) for manual tasks and sufficent staffing, you can meet more stringent security posture with shorter key life times.
In a significant number of environments, the above is not sufficiently mature.
Bear in mind. If you have Root CA =6yrs and Issuing =3yrs. Then before the 3 years come around, you need to do new CA certs AND distribute them to ALL your systems that need to trust the PKI. Whilst, in theory, this is fairly straighforward in a pure windows and AD environment with Windows PKI and all apps using the Windows certificate store, very few environments these days are like that. Think about non-AD joined windows, Apps (even on windows) which do not use Windows Certificate store (Java key stores, etc.) and non-Windows systems and devices which need to trust PKI, and dont forget cloud. Your processes and or automation must cater to all these scenarios. + every 6 years you have to do all your CAs including root.
MS recommends you renew CAs at half their actual life (I'll try to remember to find that reference). So for a 6 year root you should renew that at 3yrs and a 3year issuing would be renewed at 18 months.
Regards,
P.s. Here's the reference....
[https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/pki-design-considerations](https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/pki-design-considerations)
"CAs can't issue certificates that are valid beyond their own validity period. A best practice is to renew the CA certificate when half of its validity period is expired. When installing a CA, you should plan this date and ensure that it's recorded as a future task."
Geoff