48 HOURS ONLY: Get 2 free months of Insider Pro!

Key Rotation

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:01
Welcome back, everyone. Let's proceed with learning about key rotation.
00:07
He rotation is part of encryption key management, where a new cryptographic key is generated to replace a previously generated key after a certain time or event, which is based on its key life cycle.
00:22
Each time a new key is generated,
00:24
it is marked as the primary version and in the active state,
00:29
the previous keys will be marked as retired.
00:32
AKI's life cycle is determined on a period during which a key is active or authorized for use.
00:39
It is commonly practiced by cloud companies for data protection to their end users. However, key rotation could be used on premise or on cloud.
00:50
The key should be able to withstand the tax during its life cycle, hence has strong encryption applied to it,
00:57
and key rotation can be regular or irregular. We'll discuss the differences later in the course.
01:07
He rotation is one of many security best practices as it restricts the number of times it is used in a specific key version.
01:15
The benefit of cube rotation is limiting the duration off time in which a key is actively used to encrypt data.
01:23
It is also recommended to limit the life cycle of a key by the National Institute of Standards and Technology for enhanced security.
01:30
It prepares your system to use a stronger encryption each time a new key is generated,
01:37
and it reduces risk in the event the key may be compromised because of its purpose of rotating keys after a certain time or event.
01:49
Now, let's discuss the key rotation methods, regular rotation and irregular rotation.
01:55
Regular rotation or time based rotation is when the key is rotated after a certain time period.
02:01
For our example, we will look at a period of three months. Starting from October.
02:07
Each generated active key will be used for encrypting data,
02:12
and the key from the previous month will be retired.
02:16
However, it is worth noting that even though the key has retired, it can still be available for only the recipient to still decrypt data.
02:27
For example, the retired key used for the month of October can still be used to decrypt data for that month only you may decide to destroy the key so that they will no longer be used for encryption or decryption.
02:40
Irregular rotation is when the key rotates based on an event that triggers that rotation, in example, could be if the key is determined to be compromised. Hence with such a trigger. If such events happen,
02:54
the key will retire
02:55
and generate a new key version, which would have a stronger encryption than its previous version.
03:07
Quiz Time
03:07
After a new cryptographic key hasn't generated
03:12
what will happen to the retired key.
03:25
It can still be used for decrypting data.
03:35
All right, so to recap on key rotation, we discussed its features. How it contributes an encryption key management,
03:43
and we learned about regular and irregular key rotation.
03:49
Now let's head on over to our next topic remote access technologies.
Up Next