Rotation And Lifecycle
Treat every credential as a lifecycle object: create, activate, rotate, deprecate, revoke.
Rotation cadence
- High-risk external integrations: 30-60 days.
- Internal service credentials: 60-90 days.
- Emergency rotation: immediately after suspected exposure.
Safe rotation sequence
- Create new secret version in source of truth.
- Update Zerq credential binding to new version or env key.
- Run smoke test on one protected route.
- Keep old credential valid briefly for rollback window.
- Revoke old credential after successful observation period.
Verification checks
# After rotation, verify protected route still works
curl -i "https://gateway.example.com/v1/billing/health" \
-H "Authorization: Bearer $TOKEN" \
-H "X-Client-ID: billing-cron" \
-H "X-Profile-ID: prod-billing"
Expected gateway policy statuses
401unauthenticated request.403unauthorized identity.405unsupported method.429over quota.
If only upstream secret is wrong, monitor for backend auth failure signals in request logs and mapped error payloads.