>> "A malicious user, deletes all our keys, either because of a security problem on your side or on our side. Sure we would have to substitute our keys, but that would result in a major service disruption. In this case, are you able to roll back our backup, for example to the day before? Is that a service that you offer? "
No, it's not something we offer. And if we did begin offering it in the future (no current plans) it would be expensive. Especially if the functionality required "no major service disruption".
Long story short: it's a big, bloated engineering and legal problem that would cost a bunch (for us, and thus for you) and provide very minimal benefit. Especially if you use security best practices. Namely:
1. Enable 2fa for all accounts using your LimeLM account.
2. Only provide edit / delete permissions to employees you trust (and that reside in regions where laws can be enforced).
>> "If a disaster happens, we shouldn't have to issue new keys to all customers, unless required. "
It's all about risk management. We also offer a version of LimeLM that you can run on your own servers. This would "solve" your problem (you could have daily backups of just your data and roll it back at any time). But, again, it's very expensive (both the cost of the product itself and the ongoing management costs -- people, equipment, power, network connection, DDoS protection, etc., etc.).
So, you have options. It's about choosing the right balance of price & functionality.
My recommendations are fairly clear and provide a good balance of price, functionality and security:
1. Use our hosted version of LimeLM (it's cheaper and we handle all of the sticky technical, legal, and security issues).
2. Enable 2fa for your account. Only provide access to your employees that *need* access. And for them only give them the permissions they need.
3. Backup your data.
4. If you gave a bad-actor in your company permission to edit / delete keys, and they acted as a bad actor, then you still have the option of using your backup of the customer data to reach out to your customers and explain the situation.
Long story short: this is a classic risk management problem that is not solved with an algorithm. It's solved with good security practices, background checks, good legal agreements, and viable "last resort" option that while imperfect for your needs *does* provide a solution (i.e. generating new keys to replace the keys the malicious actor deleted).