Skip to content

How do we rotate backup encryption keys without making old backups unreadable?

Key rotation is best practice but done badly destroys backups. Trick: new backups under new key, old backups still readable under old key, you keep both until retention expires.

Try this first

  1. 1Inventory where keys live: backup tool itself, KMS (AWS, Azure, GCP), HashiCorp Vault, or password manager. Document per repo which key.
  2. 2Pick a rotation frequency matching risk. Yearly is common, half-yearly for regulated, faster only after suspected compromise.
  3. 3Generate a new key, configure the backup tool to encrypt new backups with it. Most tools (Veeam, Acronis, Restic, Duplicacy) support parallel keys.
  4. 4Keep the old key until the last backup made with it has aged past retention. Only then destroy it safely, not sooner.
  5. 5Store old and new keys in separate storage with version tag and use-date. Lose a key, lose the backup.
  6. 6After rotation, restore-test from one old-key backup and one new-key backup. Both must work before rotation is complete.

When to bring us in

Regulated environments (PCI-DSS, HIPAA-equivalent) have strict logging requirements and possibly HSM use. Get a security engineer, this is not DIY.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.