Re-Keying an Encrypted Database

Re-keying an encrypted database refers to rotating the masker key and data encryption keys (DEKs) used to encrypt checkpoint and transaction log files. The database files are then re-encrypted using the new keys.

It is highly recommended that you implement a time-based key rotation strategy as best practice based on your own risk assessment, contractual requirements, and security policies of your organization. To rekey an encrypted database, see Re-Keying an Encrypted Database in Oracle TimesTen In-Memory Database Security Guide.