Skip to content

Rotation Schemes

Sonata implements key rotation to limit the impact of potential key compromise while maintaining access to existing content.

Overview

This page describes Sonata's approach to encryption key rotation.

Future Content

  • Rotation triggers
  • Re-encryption strategy
  • Backward compatibility
  • Validator coordination