Skip to main content

Least Privilege and Key Rotation

Credential scope should match backup intent, not full cloud account administration.

Permission Scope Design

Dataset roleRequired rights
Append-only archiveList + write
Mirror sync pathList + write + delete
Verification-only accountRead/list only

Rotation Policy Template

  1. Create new key with same scoped policy.
  2. Update remote config in staging.
  3. Run smoke tests (lsd, small copy).
  4. Deploy to production jobs.
  5. Revoke old key.

Mapping

post-rotation-smoke-test.sh
rclone lsd remote-prod:
rclone copy /tmp/health.txt remote-prod:healthcheck/
rclone delete remote-prod:healthcheck/health.txt
info

Key rotation is not just security hygiene. It validates whether your runbooks actually work.

Audit Signals

SignalWhat to watch
Unexpected delete API callsPotential privilege creep
Failed auth after rotationIncomplete rollout
Jobs still using old keyAutomation drift

Common Pitfalls

PitfallConsequencePrevention
Rotating without staged validationProduction outageStage then promote
One key shared across all jobsHigh blast radiusSplit keys by domain
No revocation stepDormant active credentialsFinalize with explicit revoke checklist

What's Next