Re-Keying an Encrypted Database
Re-keying an encrypted database refers to rotating the masker key
and data encryption keys (DEKs) used to encrypt checkpoint and transaction log files.
The database files are then re-encrypted using the new keys.
It is highly recommended that you implement a time-based key rotation strategy as best practice based on your own risk assessment, contractual requirements, and security policies of your organization. To rekey an encrypted database, see Re-Keying an Encrypted Database in Oracle TimesTen In-Memory Database Security Guide.