Sealcraft treats keys as operational artifacts. Rotation, provider migration, and shred are first-class commands with dry-run support.

Playbook

  • KEK rotation -- rewrap every DEK under the current KEK version. Fast, no data re-encrypted, safe during normal operation.
  • DEK rotation -- re-encrypt every row under a new DEK. Slower, requires a maintenance window.
  • Provider migration -- move DEKs between KMS providers (AWS -> GCP, Vault -> Azure, etc.).
  • Crypto-shred -- destroy a context's DEK to render ciphertext permanently unrecoverable.

Dry run

Every destructive command supports --dry-run. Use it first, every time.

Audit

php artisan sealcraft:audit

Reports DEK counts, distribution by context type, distribution by KEK version, and optionally runs a round-trip encrypt/decrypt validation against every DEK to catch corruption or provider drift.


Contributors

Thank you to everyone who has contributed to this package. Every pull request, bug report, and idea makes a difference.