Skip to content

Encryption Key Management

Backup encryption protects your data at rest. Breeze manages encryption keys that are used when writing snapshots to storage. Each snapshot references the key it was encrypted with, so keys must be available for restore operations.


Go to Operations > Backup > Encryption to see your encryption keys.

The key list shows:

  • Key name
  • Key type (AES-256 or RSA-2048)
  • Status: Active (green), Rotated (gray), or Deactivated (red)
  • Created date
  • Expiry date (if set)

  1. Click Create New Key.
  2. Enter a descriptive name (e.g., “Production AES Key 2026”).
  3. Select the key type:
    • AES-256 — symmetric encryption, recommended for most use cases
    • RSA-2048 — asymmetric encryption, useful for scenarios where separate encrypt/decrypt permissions are needed
  4. Click Create.
  5. The key’s fingerprint (SHA-256 hash) is displayed. Record this for your records.

Key rotation creates a new key version while keeping the old version available for decrypting existing snapshots. New backups use the rotated key.

  1. Click the Rotate action on an active key.
  2. Confirm the rotation.
  3. The old key moves to Rotated status. A new active key is created.

You can configure automatic rotation (every 30, 60, or 90 days) in the storage configuration wizard.


Click Deactivate on a key to prevent it from being used for new backups. Deactivated keys remain available for decrypting existing snapshots.


  • In transit — all backup data is transferred over HTTPS (TLS 1.2+)
  • At rest — snapshots are encrypted using the assigned key before being written to storage
  • Each snapshot stores a reference to its encryption key ID, so the correct key is used automatically during restore
  • Keys themselves are stored encrypted in the Breeze database with access scoped to the organization