The database went dark in the middle of a production push. Not because the server failed. Not because of an attack. It was the certificate.
Transparent Data Encryption (TDE) had been running for months without anyone thinking about the rotation schedule. When the certificate expired, the encryption key locked away the database like a vault with no combination. Hours of downtime followed.
Certificate rotation for Transparent Data Encryption is not an afterthought. It is core to data protection. TDE encrypts data at rest using a Database Encryption Key (DEK), which is itself encrypted by a certificate. That certificate has a lifespan. When it reaches the end, a new one must take its place without stopping service or risking data loss.
The process begins with creating a new certificate in the database master key. The DEK is then re-encrypted with this new certificate. Old certificates stay long enough to decrypt older backups. After the transition period, unused certificates are removed to reduce risk.