The first time a team loses control of its keys, it’s never because they didn’t care. It’s because they didn’t think to look.
Auditing GPG isn’t glamorous, but it’s the line between trust and chaos. Every encrypted message, every signed commit, every identity check depends on those keys being exactly what you think they are. If you haven’t audited them, you’re working blind.
A proper GPG audit starts with discovery. List every public key in use. Match each to an active user. Confirm fingerprints against a trusted source. Remove stale keys. Disable compromised ones. Keep a record—dates, owners, reasons. Small mistakes here ripple through an entire workflow.
After discovery comes verification. Test signatures. Validate expired keys are replaced, not ignored. Ensure algorithms meet your security baseline—no weak ciphers, no outdated preferences. GPG isn’t immune to drift; configs change, defaults shift. Auditing puts you back in control.