Non Human Identity Lifecycle Management

Secret Rotation

Diagram representing a glossary term in Oasis Security, illustrating key concepts in non human identity management

Secret rotation is the process of regularly updating or replacing cryptographic keys, passwords, API tokens, or other sensitive credentials to mitigate the risk of unauthorized access, data breaches, or security incidents. Secret rotation helps ensure that sensitive information remains secure and that any compromised credentials are promptly invalidated.

For example, in a cloud environment, secret rotation may involve periodically generating new encryption keys, rotating database passwords, or refreshing API tokens used by applications or services. These secrets are replaced with new values, and any existing tokens or credentials are revoked to prevent unauthorized access.

Secret rotation is typically performed according to a predefined schedule or policy, such as every 90 days or after a certain number of uses. Automated processes or scripts may be used to generate new secrets, update configurations, and distribute updated credentials to applications or services.

Secret rotation is a critical aspect of security best practices, helping organizations reduce the risk of credential compromise, insider threats, or unauthorized access to sensitive data. By regularly rotating secrets, organizations can improve their security posture, comply with regulatory requirements, and protect against evolving threats.