Credential Rotation Planner

Build a credential inventory, apply recommended rotation intervals, and generate a deadline calendar with risk and compliance views. Runs entirely in your browser.

Add credential

Track each secret or key with type, age, environment, and ownership. Risk level is estimated from type, staleness, and environment.

Inventory

Name Type Age Env Interval Risk

No credentials yet. Add at least one row, then generate the plan.

Risk summary

Rotation calendar

Upcoming rotation deadlines sorted by due date. Overdue items appear in red.

Compliance gap analysis

Export

JSON includes full inventory plus computed due dates, risk, and compliance flags. CSV opens in spreadsheets.

Recommended intervals (defaults)

Override any credential with a custom interval when your policy differs.

TypeDefault intervalNotes
SSH Key90 daysAlign with key lifecycle & offboarding
Database Password60 daysTighter for privileged DB accounts
API Token30 daysHigh exposure; prefer short-lived tokens
Service Account Key90 daysPair with workload identity where possible
TLS Certificate90 daysACME-style certs often renew sooner
Cloud IAM Key90 daysFollow CSP key rotation guidance

Automate credential rotation with OnePAM

OnePAM's secrets vault handles automatic credential rotation across SSH keys, database passwords, and API tokens with zero downtime.

Start Free Trial

Frequently Asked Questions

Credential rotation schedules, compliance, and automation with OnePAM

How often should credentials be rotated?

Intervals depend on credential type, exposure, and policy. Common baselines: API tokens every 30 days (or shorter if exposed to clients), database passwords every 60 days for privileged accounts, SSH keys every 90 days, and TLS certificates before expiry (often 90 days or less with automated ACME). Production and regulated environments typically require stricter schedules. This planner uses industry-typical defaults you can override per credential.

What are the risks of not rotating credentials?

Stale credentials increase blast radius: leaked or guessed secrets remain valid indefinitely, former employees or contractors may still have access, and attackers have more time to abuse compromised material. Long-lived API keys and database passwords are common breach enablers. Regular rotation limits exposure windows and supports audit evidence that access is actively managed.

Which compliance frameworks require credential rotation?

PCI-DSS requires periodic password changes for application and system accounts (commonly interpreted as at least every 90 days for passwords). SOC 2 and ISO 27001 expect documented procedures for credential lifecycle management, including rotation and revocation, aligned with risk. HIPAA emphasizes access control and workforce security; rotation supports those controls even when a single numeric interval is not spelled out. Always map controls to your auditor's interpretation and internal policy.

What is the difference between manual and automated rotation?

Manual rotation relies on tickets, runbooks, and human memory — it is error-prone, hard to scale, and often slips during busy periods. Automated rotation uses a vault or platform to create new secrets, update consumers, and retire old values on a schedule or on demand, often with rollback paths. Automation improves consistency, auditability, and reduces downtime when paired with connection pooling and health checks.

How does OnePAM handle credential rotation?

OnePAM stores secrets in an encrypted vault and can inject credentials into sessions without exposing them to end users. For supported integrations, rotation policies can align with your schedules so SSH keys, database passwords, and API tokens are refreshed automatically where configured, reducing operational toil while preserving zero-downtime patterns appropriate to each protocol.