Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Key Management Service
  • Getting started
    • Overview
    • Envelope encryption
    • Key consistency
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • FAQ
  1. Concepts
  2. Key consistency

Key consistency

Written by
Yandex Cloud
Updated at March 31, 2025

The REST API encrypt, decrypt, reEncrypt for the SymmetricCrypto resource and the gRPC API SymmetricCryptoService/Encrypt, SymmetricCryptoService/Decrypt, and SymmetricCryptoService/ReEncrypt method calls are eventually consistent operations. It takes up to three hours for the updates they make to take effect.

Eventually consistent operations require up to three hours for the changes to take effect:

  • Rotating keys (automatically and manually).
  • Changing the primary version of a key.
  • Changing the key status to Inactive.
  • Scheduling a key version for destruction.
  • Deleting a key.

Strongly consistent operations take effect without delay:

  • Creating keys.
  • Changing the key status to Active.
  • Canceling scheduled key version destruction (the version status is Scheduled For Destruction).

Note

To quickly restrict access to a key, revoke the roles required to use the key for encrypting and decrypting data. For more information, see Access management in Key Management Service.

Use casesUse cases

  • Encrypting data using the Yandex Cloud CLI and API

Was the article helpful?

Previous
Envelope encryption
Next
Quotas and limits
© 2025 Direct Cursus Technology L.L.C.