-
I want to make sure I understand best practices around key rotation and migrations more generally. Suppose my encryption key has been leaked. Here's what I think I would do:
Is this the right approach? (I assume we could skip step 7 and leave the call to the Thanks in advance! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
This is correct! As for logging, it depends on your deployment setup. You could for example send a notification email when the |
Beta Was this translation helpful? Give feedback.
This is correct!
As for logging, it depends on your deployment setup.
You could for example send a notification email when the
migrate
function returns (with the report of migrated records), or use metrics sent to Prometheus to monitor the progress in an APM.