Cryptographic Key Changes at Cryptoperiod End
PCI DSS 4.0.1 requires you to change cryptographic keys when they reach the end of their defined cryptoperiod, using policies and procedures based on application vendor guidance, key-owner decisions, and industry best practices. To operationalize it fast, you need an accurate key inventory, cryptoperiod definitions per key type, a rotation/replacement process that avoids outages, and audit-ready evidence of timely changes.
Key takeaways:
- Define cryptoperiods per key type and system owner, then enforce rotation automatically where possible.
- Prove execution: rotation logs, change records, approvals, and key inventory snapshots matter as much as the policy.
- Treat third-party and application-managed keys explicitly; “the vendor handles it” still needs your governance and evidence.
“Cryptographic key changes at cryptoperiod end” is a deceptively simple requirement that fails in practice for one reason: most organizations cannot reliably answer “Which keys do we have, who owns them, when do they expire, and what happens when we rotate them?” PCI DSS 4.0.1 Requirement 3.7.4 forces that clarity by requiring key-management policies and procedures for changing keys that have reached the end of their cryptoperiod (PCI DSS v4.0.1 Requirement 3.7.4).
As a CCO or GRC lead, your job is to make this executable across engineering, security, and operations without turning every rotation into a high-risk event. That means setting cryptoperiod definitions that fit the algorithm and use case, establishing ownership, ensuring safe rotation methods (including re-encryption and key versioning), and keeping evidence that shows the control runs as designed.
This page gives requirement-level implementation guidance you can hand to teams: scope, steps, artifacts to retain, audit traps, and a practical execution plan that gets you from policy to proof.
Regulatory text
PCI DSS 4.0.1 Requirement 3.7.4 states: “Key-management policies and procedures are implemented for cryptographic key changes for keys that have reached the end of their cryptoperiod, as defined by the associated application vendor or key owner, and based on industry best practices and guidelines.” (PCI DSS v4.0.1 Requirement 3.7.4)
Operator interpretation (what you must do):
- You must define a cryptoperiod for each relevant key (or key class) based on application vendor guidance or the key owner’s definition, aligned to recognized best practices (PCI DSS v4.0.1 Requirement 3.7.4).
- You must change keys when that cryptoperiod ends, using documented policies and procedures that teams follow in real operations (PCI DSS v4.0.1 Requirement 3.7.4).
- You must be able to demonstrate the above with evidence: inventory, configuration, rotation records, and operational tickets/change logs.
Plain-English requirement
If a cryptographic key is still in use after its approved lifetime, you are out of compliance. You need a written, implemented process that (1) sets key lifetimes, (2) rotates/replaces keys at the right time, and (3) proves it happened.
This covers more than just “TLS certificate renewals.” It includes encryption keys protecting cardholder data, keys encrypting databases or object stores, tokenization keys, HSM-wrapped keys, key-encryption keys (KEKs), and signing keys, if they fall in scope for your cardholder data environment and PCI requirements.
Who it applies to (entity and operational context)
In scope entities
- Merchants, service providers, and payment processors that store, process, or transmit cardholder data and manage cryptographic keys in that environment (PCI DSS v4.0.1 Requirement 3.7.4).
In scope operational contexts
- Centralized key management (KMS/HSM-backed key generation, wrapping, rotation).
- Application-managed keys (keys created/held by the application, libraries, or platform services).
- Third-party managed components where a third party rotates keys on your behalf (you still need governance and evidence to show the requirement is met).
Practical scoping tip: Tie scope to where keys protect cardholder data or provide cryptographic security functions for the cardholder data environment. If you cannot map a key to a system and owner, treat that as a control gap.
What you actually need to do (step-by-step)
1) Build a key inventory you can audit
Create or update an inventory that captures, at minimum:
- Key identifier (logical name/alias), key type (encryption, signing, wrapping), and algorithm
- System/application(s) that use the key and data classification protected
- Key owner (person/team) and custodian (platform/security)
- Storage location (HSM, KMS, application, third-party service)
- Cryptoperiod definition and rotation method
- Last rotation date and next rotation due date
- Whether rotation is automatic or manual, and the procedure reference
Why auditors care: If you can’t enumerate keys and their cryptoperiods, you can’t show “implemented” procedures (PCI DSS v4.0.1 Requirement 3.7.4).
2) Define cryptoperiods per key class and source of truth
For each key (or key class), document:
- The cryptoperiod duration trigger (time-based or event-based)
- The authoritative basis: application vendor documentation or key owner definition, aligned to best practices (PCI DSS v4.0.1 Requirement 3.7.4)
- Compensating operational constraints (e.g., legacy system limitations) and the approved exception path
Decision point: If vendor guidance exists, reference it in your internal standard and link it to the key inventory entry. If no vendor guidance exists, the key owner must define the cryptoperiod and record the rationale.
3) Choose the right rotation pattern (avoid outages and data loss)
Not all key changes look the same. Document the pattern you’ll use:
- Key versioning (preferred for data-at-rest): Create a new key version for encryption; new data uses the new version; decrypt supports old versions; re-encrypt old data via a controlled job.
- Immediate cutover (common for signing keys): Introduce a new signing key; distribute new public key/cert chain; verify dual validation if needed; retire old key after propagation.
- KEK/DEK hierarchy rotation: Rotate DEKs frequently and KEKs less frequently, if your architecture supports it; document the hierarchy and rotation dependencies.
Your procedure should state how you prevent “key rotation = incident,” including rollback steps, monitoring, and validation tests.
4) Implement the procedure in change management and automation
Turn the policy into repeatable operations:
- Create standard change templates for rotations (pre-checks, implementation, validation, rollback).
- Automate rotation through KMS/HSM capabilities where feasible, and capture logs.
- Integrate rotation due dates into ticketing/alerting so rotations aren’t calendar-driven tribal knowledge.
- Ensure separation of duties where required by your internal key management policy (for example, request/approval vs execution), and retain evidence of approvals.
5) Handle third-party and managed-service keys explicitly
If a third party rotates keys:
- Contractually require rotation at cryptoperiod end and require evidence delivery (rotation attestations, logs, or reports).
- Map the third party’s key identifiers to your inventory.
- Define what you review (e.g., monthly key rotation report, incident notifications for missed rotations).
A common audit failure is “the cloud provider handles it” with no retained proof or mapped ownership.
6) Operational monitoring: detect missed rotations before an assessor does
Set control checks that identify:
- Keys past due for rotation
- Systems still using retired keys
- Rotation failures (jobs that ran but didn’t complete)
Then route these as tracked issues with remediation owners and timelines.
7) Define exceptions without creating a permanent loophole
You may have legacy systems that cannot rotate without redesign. Your exception process should require:
- Business and security owner approval
- Risk acceptance with documented rationale
- Compensating controls (increased monitoring, reduced access, segmentation)
- A remediation plan to remove the exception
Required evidence and artifacts to retain
Keep evidence that shows the requirement is implemented, not aspirational (PCI DSS v4.0.1 Requirement 3.7.4):
Policies and standards
- Key management policy covering cryptoperiod definition and key change requirements
- Cryptoperiod standard by key type/use case, including owner and approval authority
Operational procedures
- Runbooks for rotation per platform (KMS, HSM, application-managed)
- Change templates and rollback/testing checklists
Execution evidence
- Key inventory export/snapshot showing cryptoperiod and rotation dates
- Rotation logs from KMS/HSM or application logs showing key version changes
- Change tickets with approvals, implementation notes, validation results
- Evidence of third-party rotation reports and your review/acceptance
Governance evidence
- Exception register entries (if any), with approvals and planned remediation
- Periodic reporting to security/compliance on rotation status
Common exam/audit questions and hangups
Expect assessors to test the control from three angles: definition, execution, and proof.
Typical questions
- “Show me your cryptoperiod definitions and who approved them.” (PCI DSS v4.0.1 Requirement 3.7.4)
- “Pick a few keys. When did they last rotate? Show evidence.”
- “How do you ensure rotations occur on time?”
- “Which keys are owned by third parties, and what evidence do you retain?”
- “What happens to previously encrypted data after rotation?”
Common hangups
- Inventory lists certificates but ignores data encryption keys.
- A policy exists, but rotations happen ad hoc with no consistent records.
- Rotation is automated, but logs aren’t retained or are inaccessible to audit teams.
Frequent implementation mistakes and how to avoid them
-
Treating cryptoperiod as “certificate expiry only.”
Avoid it by inventorying all key types used for encryption, signing, and key wrapping in scope. -
No clear key owner.
Fix it by assigning an accountable owner per application or platform service, and documenting it in the inventory. -
Rotating keys without a data re-encryption plan.
Use key versioning, keep old versions for decryption until re-encryption completes, and document retirement criteria. -
Assuming third-party control equals compliance.
Add contractual requirements and retain third-party evidence; map it into your inventory. -
No evidence trail.
Make evidence collection part of the procedure: rotation ticket, logs attached, approver recorded, post-change validation captured.
Enforcement context and risk implications
No public enforcement cases were provided in the allowed sources for this requirement, so this page does not cite specific cases. Practically, missed key changes increase the window of exposure if a key is compromised and can also break non-repudiation and integrity controls for signed transactions. From a PCI assessment standpoint, the largest risk is failing to demonstrate consistent, provable execution aligned to your defined cryptoperiods (PCI DSS v4.0.1 Requirement 3.7.4).
Practical 30/60/90-day execution plan
First 30 days (stabilize scope and ownership)
- Assign a control owner and identify in-scope platforms and applications that generate/store/use cryptographic keys.
- Produce a first-pass key inventory (even if incomplete) and tag unknowns for follow-up.
- Draft or update cryptoperiod standards based on vendor guidance where available; assign key owners to define the rest (PCI DSS v4.0.1 Requirement 3.7.4).
- Identify rotations already overdue and open tracked remediation items.
Days 31–60 (implement repeatable rotation)
- Publish rotation runbooks by platform (KMS/HSM/application-managed).
- Integrate rotation scheduling into ticketing and change management; require evidence attachments.
- Turn on or configure automated rotation where supported, plus log retention and access for audit.
- Establish third-party evidence intake (reports/attestations) and a review cadence.
Days 61–90 (prove and harden)
- Run a tabletop test of rotation for representative key types (encryption at rest, signing, KEK/DEK).
- Audit your own evidence for a sample set of keys; close gaps before assessment.
- Formalize exception handling and ensure exceptions are time-bound with remediation plans.
- Operationalize ongoing reporting (past-due keys, upcoming rotations, failures).
Where Daydream fits naturally: Many teams lose time building and maintaining a defensible key inventory and evidence pack across mixed environments. Daydream can centralize key rotation obligations (including third-party attestations), track owners and due states, and assemble audit-ready artifacts without chasing screenshots across teams.
Frequently Asked Questions
Does PCI DSS 3.7.4 require a specific cryptoperiod length (e.g., annually)?
No specific duration is stated in the requirement text. You must define cryptoperiods based on the application vendor or key owner, using industry best practices and guidelines, then change keys when that cryptoperiod ends (PCI DSS v4.0.1 Requirement 3.7.4).
Are TLS certificates covered by “cryptographic keys” here?
If certificates and their associated private keys provide cryptographic security for in-scope systems, treat them as part of your key inventory and rotate them at cryptoperiod end per your defined standard (PCI DSS v4.0.1 Requirement 3.7.4).
We use a cloud KMS with automatic rotation. Is that enough?
Automatic rotation can satisfy execution, but you still need documented policies/procedures, a key inventory showing cryptoperiod/rotation settings, and retained logs or reports proving rotations occurred (PCI DSS v4.0.1 Requirement 3.7.4).
What evidence do assessors usually accept for key changes?
Common evidence includes KMS/HSM rotation logs, key version history, change tickets with approvals and validation results, and an inventory snapshot showing last/next rotation dates (PCI DSS v4.0.1 Requirement 3.7.4).
How do we handle encrypted data after rotating a data-at-rest key?
Use key versioning so old data remains decryptable while new data uses the new key version, then re-encrypt old data through a controlled process and retire old versions per your procedure.
A third party manages an application and says they rotate keys. What do we need?
You need governance: documented responsibility, contractual or documented commitments to rotate at cryptoperiod end, and evidence you retain and review (such as rotation reports or attestations) mapped back to your inventory (PCI DSS v4.0.1 Requirement 3.7.4).
Frequently Asked Questions
Does PCI DSS 3.7.4 require a specific cryptoperiod length (e.g., annually)?
No specific duration is stated in the requirement text. You must define cryptoperiods based on the application vendor or key owner, using industry best practices and guidelines, then change keys when that cryptoperiod ends (PCI DSS v4.0.1 Requirement 3.7.4).
Are TLS certificates covered by “cryptographic keys” here?
If certificates and their associated private keys provide cryptographic security for in-scope systems, treat them as part of your key inventory and rotate them at cryptoperiod end per your defined standard (PCI DSS v4.0.1 Requirement 3.7.4).
We use a cloud KMS with automatic rotation. Is that enough?
Automatic rotation can satisfy execution, but you still need documented policies/procedures, a key inventory showing cryptoperiod/rotation settings, and retained logs or reports proving rotations occurred (PCI DSS v4.0.1 Requirement 3.7.4).
What evidence do assessors usually accept for key changes?
Common evidence includes KMS/HSM rotation logs, key version history, change tickets with approvals and validation results, and an inventory snapshot showing last/next rotation dates (PCI DSS v4.0.1 Requirement 3.7.4).
How do we handle encrypted data after rotating a data-at-rest key?
Use key versioning so old data remains decryptable while new data uses the new key version, then re-encrypt old data through a controlled process and retire old versions per your procedure.
A third party manages an application and says they rotate keys. What do we need?
You need governance: documented responsibility, contractual or documented commitments to rotate at cryptoperiod end, and evidence you retain and review (such as rotation reports or attestations) mapped back to your inventory (PCI DSS v4.0.1 Requirement 3.7.4).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream