Secrets Rotation
internalStandardized credential rotation workflow and leak response.
Standard rotation flow
- Generate new credential.
- Rotate in non-production first.
- Validate affected flows.
- Promote to production.
- Revoke old credential after verification.
Rules
- Prefer overlap windows when provider supports dual keys.
- Keep rollback path during rotation.
- Record evidence: timestamps, environments, verification output.
Leak response
- Rotate immediately.
- Revoke compromised secret.
- audit usage window.
- escalate to incident process if impact is non-trivial.
Detailed operations copy: docs/runbooks/secrets-rotation.md