Changing KMS key for encrypted EBS volume
- This can’t done straightforward way
- Create a encrypted snapshot
- Create encrypted volume out of the snapshot with the new key
- AWS manages re-encryption

- Reencryption → Decrypt all the data and Encrypt all the data. this happens everytime we chose to copy with different KMS keys
Sharing KMS Encrypted RDS DB Snapshots
- The key must shared with respective accounts with key policies

KMS Key deletion
- Schedule CMK for deletion
- waiting period for 7 to 30 days
- Pending deletion state - The key cannot be used for cyrpto operations
- Any scheduled key rotation will not happen
- Can cancel key deletion in the waiting period
- Disable the key first, before deletion if you’re not sure
- Cloudwatch alarm can be used for automation here
