Details
-
Task
-
Status: Open (View Workflow)
-
Major
-
Resolution: Unresolved
-
None
-
None
Description
In version 3.2.1 of the PCI DSS, sections 3.6.4 and 3.6.5 say that applications must have procedures for changing or replacing encryption keys.
https://www.pcisecuritystandards.org/document_library?category=pcidss&document=pci_dss
For encryption of the binary log and the relay log, if an encryption key is rotated, then I believe that existing binary logs and relay logs continue to use the old version of the encryption key. As far as I know, MariaDB does not have any mechanism to re-encrypt binary logs and relay logs with a new encryption key or a new version of an encryption key. This limitation would make it a bit more difficult for our users to satisfy these requirements of the PCI DSS.
Attachments
Issue Links
- relates to
-
MDEV-8813 Allow mysqlbinlog read encrypted binary logs
-
- Open
-
-
MDEV-20099 Implement key rotation for Aria
-
- Open
-
Activity
Field | Original Value | New Value |
---|---|---|
Description |
In version 3.2.1 of the PCI DSS, sections 3.6.4 and 3.6.5 say that applications must have procedures for changing or replacing encryption keys.
https://www.pcisecuritystandards.org/document_library?category=pcidss&document=pci_dss For encryption related to the binary log and the relay log, if an encryption key is rotated, then believe that existing binary logs and relay logs continue to use the old version of the encryption key. As far as I know, MariaDB does not have any mechanism to re-encrypt binary logs and relay logs with a new encryption key or a new version of an encryption key. This limitation would make it a bit more difficult for our users to satisfy these requirements of the PCI DSS. |
In version 3.2.1 of the PCI DSS, sections 3.6.4 and 3.6.5 say that applications must have procedures for changing or replacing encryption keys.
https://www.pcisecuritystandards.org/document_library?category=pcidss&document=pci_dss For encryption of the binary log and the relay log, if an encryption key is rotated, then I believe that existing binary logs and relay logs continue to use the old version of the encryption key. As far as I know, MariaDB does not have any mechanism to re-encrypt binary logs and relay logs with a new encryption key or a new version of an encryption key. This limitation would make it a bit more difficult for our users to satisfy these requirements of the PCI DSS. |
Link | This issue relates to MDEV-20099 [ MDEV-20099 ] |
Fix Version/s | 10.5 [ 23123 ] |
Workflow | MariaDB v3 [ 98348 ] | MariaDB v4 [ 131136 ] |
the new binary log file will use a new key though.
do you suggest a background thread to re-encrypt exising binlogs?