If your DKIM signatures are passing today, it is tempting to leave everything alone. That is exactly how key rotation gets postponed for years.
The safer approach is to treat DKIM keys like any other production secret: rotate on a regular cadence, keep a clean change process, and rotate immediately when risk changes.
So what cadence should you use?
For most teams, a practical baseline is every 3 to 6 months.
That might sound aggressive at first, but with a repeatable runbook it becomes routine maintenance, not a risky event.
Use this schedule as a starting point:
And regardless of your normal cadence, rotate immediately after:
This is less about chasing a perfect number and more about avoiding long-lived keys.
The DKIM cryptography update in RFC 8301 establishes the security baseline most operations teams already follow in practice: rsa-sha256, with 1024-bit as minimum and 2048-bit as the practical target.
Mailbox-provider guidance lines up with that:
None of these documents says "rotate every 97 days." That is normal. Providers define security and deliverability expectations; you still need an operational cadence that your team can execute consistently.
If your team is deciding policy this week, start with this:
dkim=pass in real received headers before retiring old records.That policy is conservative enough to reduce risk, but still manageable for small teams.
If 90 days is too heavy right now, move to 180 days first, then improve process and tighten later. A rotation plan you can actually execute beats an ideal plan that never ships.
Two details regularly trip up otherwise solid teams:
Also, if you run multiple sender systems, rotate by stream in small batches (transactional first, then marketing, then support), not all at once. Incident review gets much easier when blast radius is controlled.
Use this sequence to keep rotations boring (boring is good):
DKIM-Signature shows new s= value.Authentication-Results shows dkim=pass.For message-header troubleshooting patterns, keep DMARC troubleshooting with Authentication-Results headers bookmarked.
Most DKIM rotation pain comes from operations mistakes, not cryptography:
A tiny tracker (domain, selector, created date, next rotation date, owner) prevents most of this.
If you need one decision today, set DKIM rotation to every 90 to 180 days and put it on the calendar now.
Then improve from there: unique selectors, overlap windows, and header-based verification on every change.
If you want a deeper selector process, read DKIM selectors and key rotation playbook and DKIM Key Rotation: Is Rotating Selectors Important?.