Support auto rotation of encryption keys in Replicate and QEM
Changing the encryption keys (master keys) in Replicate and QEM once they are functional makes them unusable.
For Replicate, a user has to go in and change every single credential in the Replicate instance
QEM documentation does not mention the process to ensure QEM is operational after changing the master key.
As per PCI DSS best practices we need to rotate the encryption keys frequently. Not able to do that automatically poses a security risk for Replicate and QEM use.
I would like to propose and enhancement to support rotation of encryption keys automatically in Replicate and QEM.
Your request is still under consideration. At this point, we do not have any updates on if/when we will be able to add it to a future release. We will let you know if we have any questions or need additional details around this request and certainly update once there is a change in the status.
NOTE: Upon clicking this link 2 tabs may open - please feel free to close the one with a login page. If you only see 1 tab with the login page, please try clicking this link first: Authenticate me! then try the link above again. Ensure pop-up blocker is off.