Rotation Schemes
Sonata implements key rotation to limit the impact of potential key compromise while maintaining access to existing content.
Overview
This page describes Sonata's approach to encryption key rotation.
Future Content
- Rotation triggers
- Re-encryption strategy
- Backward compatibility
- Validator coordination