-
Notifications
You must be signed in to change notification settings - Fork 8.6k
Support key rotation for Encrypted Saved Objects #56889
Copy link
Copy link
Closed
Labels
Feature:ActionsFeature:AlertingFeature:Saved ObjectsReleaseStatusItem of high enough importance that it should be called out in release status meetingsItem of high enough importance that it should be called out in release status meetingsTeam:ResponseOpsPlatform ResponseOps team (formerly the Cases and Alerting teams) t//Platform ResponseOps team (formerly the Cases and Alerting teams) t//Team:SecurityPlatform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//
Metadata
Metadata
Assignees
Labels
Feature:ActionsFeature:AlertingFeature:Saved ObjectsReleaseStatusItem of high enough importance that it should be called out in release status meetingsItem of high enough importance that it should be called out in release status meetingsTeam:ResponseOpsPlatform ResponseOps team (formerly the Cases and Alerting teams) t//Platform ResponseOps team (formerly the Cases and Alerting teams) t//Team:SecurityPlatform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//
Type
Fields
Give feedbackNo fields configured for issues without a type.
Encrypted Saved Objects make use of a key specified in config
xpack.encrypted_saved_objects.encryptionKeyto encrypt and decrypt properties. This is primarily used forIf you change the encryptionKey, at the moment there is no mechanism to update saved objects that rely on it. Alerts and actions will stop working, and you have two options: recreate the alerts and actions using the new key, or revert back to the old key.
In addition, with multiple Kibana instances it's possible to end up with different keys on each instance. When this occurs alerts & actions will fail when they run/decrypt on a different instance than the one that encrypted the data. There is no way to fix this problem when it occurs.
A mechanism is needed to move data to a new key, and retire existing keys (decrypt only) so they can eventually be removed.
Related: #56448
In the encrypted saved objects RFC, key rotation was briefly discussed and could be used as a starting point for this issue: #33740 (comment)