When an encryption settings definition is compromised, all data encrypted with that definition is vulnerable and you must stop using the definition immediately.
If an encryption settings definition is compromised, stop using that definition immediately. You must re-encrypt any data encrypted with the compromised definition using a new definition or purge that data from the server. To minimize the risk of data exposure, act quickly on all servers using this definition and act on one server at a time to avoid environment-wide downtime.
If you have a compromised encryption settings definition: