Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Key Management Service
  • Getting started
    • Overview
    • Envelope encryption
    • Key consistency
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • FAQ
  1. Concepts
  2. Key consistency

Key consistency

Written by
Yandex Cloud
Updated at November 6, 2025

Some operations are eventually consistent. The changes they produce take up to three hours to take effect. These operations include:

  • Rotating keys (automatically and manually).
  • Changing the primary version of a key.
  • Changing the key status to Inactive.
  • Scheduling a key version for destruction.
  • Deleting a key.

The REST API methods encrypt, decrypt, reEncrypt for the SymmetricCrypto resource and the gRPC API calls SymmetricCryptoService/Encrypt, SymmetricCryptoService/Decrypt, and SymmetricCryptoService/ReEncrypt may not see the changes introduced by eventually consistent operations for up to three hours, e.g., encryption will use the old key version if rotation took place less than three hours ago.

Strongly consistent operations take effect without delay:

  • Creating keys.
  • Changing the key status to Active.
  • Canceling scheduled key version destruction (the version status is Scheduled For Destruction).

Note

To quickly restrict access to a key, revoke the roles required to use the key for encrypting and decrypting data. For more information, see Access management in Key Management Service.

Use casesUse cases

  • Encrypting data using the Yandex Cloud CLI and API

Was the article helpful?

Previous
Envelope encryption
Next
Quotas and limits
© 2025 Direct Cursus Technology L.L.C.