Skip to main content
Version: 1.0.0

Key Rotation

Key rotation refers to the process of periodically changing the cryptographic keys used to encrypt data or authenticate access. This is an important security practice that helps reduce the risk of data breaches or unauthorized access over time.

With key rotation, new encryption keys are generated on a regular schedule, such as every 90 days. The data is then re-encrypted using the new keys. The old keys are invalidated but retained in the event they are needed to decrypt data encrypted with them. This ensures data remains accessible while the underlying keys change. Key rotation is commonly used with asymmetric encryption, where a public key encrypts data and a private key decrypts it. The public keys can be safely rotated periodically without losing access to the data. Key rotation is also applied to symmetric encryption keys, digital certificates, and cryptographic hashes used in applications and infrastructure. Frequent key rotation limits the value of stolen keys and the damage that can be done if keys are compromised. Overall, routinely updating keys through rotation makes long-term data security much stronger.