Control: 4.16 Ensure customer created Customer Managed Key (CMK) is rotated at least annually
Description
Oracle Cloud Infrastructure Vault securely stores master encryption keys that protect your your encrypted data. You can use the Vault service to rotate keys to generate new cryptographic material. Periodically rotating keys limits the amount of data encrypted by one key version.
Rotating keys annually limits the data encrypted under one key version. Key rotation thereby reduces the risk in case a key is ever compromised.
Remediation
From Console
- Login to OCI Console.
- Select
Identity & Security
from the Services menu. - Select
Vault
. - Click on the individual Vault under the Name heading.
- Click on the menu next to the time created.
- Click
Rotate Key
.
From CLI
- Execute the following:
oci kms management key rotate --key-id <target_key_id> --endpoint <control_plane_url>
Usage
Run the control in your terminal:
powerpipe control run oci_compliance.control.cis_v200_4_16
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run oci_compliance.control.cis_v200_4_16 --share
SQL
This control uses a named query:
kms_cmk_rotation_365