sts:AssumeRole
⇒ AWS checks the trust policy.DurationSeconds
as the value so we have transparency:
iam-role-max-session-duration
and set the desired value (≤ 3,600). If someone later raises the limit, they’ll get an alert.
Why this matters
TracepromptIngestRole
– Encrypt / GenerateDataKeyTracepromptViewer
– Decrypt (conditioned on tenant_id)TracepromptViewerCallerRole
– DescribeKeyCMK ARN | New entries since rotation | Old-key decrypts in last 30 min |
---|---|---|
…093f7 (new) | ✓ increasing | — |
…353df (old) | 0 | 0 |
Question | Answer |
---|---|
Does rotation cause double KMS cost? | Only during the overlap window when both keys are active — minimal. |
What if I forget to copy the key policy? | Traceprompt will return 403 on encryption test and refuse to save the ARN. |
Multiple orgs share one key — can I rotate just one tenant? | Yes. Policies reference tenant_id so each org can move to its own new CMK independently. |