Aller au contenu principal
Version : la plus récente

Credential rotation overview

Credential rotation is the practice of replacing a privileged password, SSH key, or token on a scheduled or on-demand basis. This article explains how rotation works in VaultPAM and how to configure rotation policies.

For step-by-step instructions to rotate a credential manually right now, see Rotate a credential.

What rotation means

When a credential is rotated, VaultPAM generates a new secret and updates the value stored in the Safe. The old secret is discarded. If the credential is linked to a managed account on a target system, VaultPAM also pushes the new value to that system.

Rotation reduces the exposure window: even if a credential is compromised, it becomes invalid after the next rotation.

Manual vs automatic rotation

ModeWhen it happensWho triggers it
ManualOn demandOperator or Admin from the Safe view
AutomaticOn a configured scheduleVaultPAM rotation engine
Event-triggeredAfter a session ends or a specific eventConfigurable per Safe

Setting rotation frequency

Rotation frequency is configured per Safe:

  1. Go to Safes and open the Safe you want to configure.
  2. Select Settings > Rotation policy.
  3. Set the rotation interval (daily, weekly, monthly, or custom in days).
  4. Optionally enable Rotate after session to rotate the credential automatically at the end of each session.
  5. Save the policy.

Success state: The Safe shows the next scheduled rotation date and time. Rotation events appear in the audit log.

Compliance rationale

Regular credential rotation is required or recommended by:

  • NIS2 Article 21 -- access control and least-privilege measures
  • SOC 2 CC6.1 -- logical access controls
  • CIS Control 5 -- account management

A 90-day rotation maximum is a common baseline for privileged accounts. For service accounts with automated checkout, shorter intervals (7-30 days) are recommended.