Key Rotation Overview

Purpose of Key Rotation

Keys that are widely or repeatedly used are insecure. To enhance the security of encryption keys, you are advised to periodically rotate keys and change their key materials.

The purposes of key rotation are:

Key Rotation Methods

You can use either of the following key rotation methods:

KMS retains all versions of a custom key, so that you can decrypt any ciphertext encrypted using the custom key.
  • KMS uses the latest version of the custom key to encrypt data.
  • When decrypting data, KMS uses the custom key version that was used to encrypt the data.

Rotation Modes

Table 1 Key rotation modes

Key Type

Rotation Mode

Default master key

Cannot be rotated.

User-defined key (imported CMK)

Can only be manually rotated.

For more information about user-defined keys, see CMK Overview.

Symmetric key

Can be automatically or manually rotated.

Disabled CMK

Disabled CMKs are not rotated. KMS keeps their rotation status unchanged. After a CMK is enabled, if it has been used for longer than the rotation period, KMS will immediately rotate keys. If the CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.

For more information, see Disabling One or More CMKs.

CMKs in pending deletion state

Disabled CMKs are not rotated. KMS keeps their rotation status unchanged. After a CMK is enabled, if it has been used for longer than the rotation period, KMS will immediately rotate keys. If the CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.

For more information, see Scheduling the Deletion of One or More Keys.

You can check the rotation details on the Rotation Policy page, including the last rotation time and number of rotations.