Creating an API Key
Name the key
Give the key a descriptive name that identifies its purpose (e.g., “CI/CD Pipeline - Production”, “Internal Dashboard”, “Audit Export Script”).
Set permissions
Select the access level for the key. Choose the minimum permissions required for its intended use.
Set environment scope (optional)
If your organization uses multiple environments, scope the key to specific environments.
Set expiration (optional)
Configure an expiration date for the key. Expiring keys are a security best practice.
Key Permissions
API keys can be configured with different permission levels:| Permission | Description | Use Case |
|---|---|---|
| Read-only | Can read compliance data but cannot make changes | Dashboards, reporting, monitoring |
| Read-write | Can read and modify compliance data | Automation scripts, CI/CD integrations |
| Admin | Full API access including settings and user management | Internal platform integrations |
Environment Scoping
If your organization manages separate environments (production, staging, development), you can scope API keys to specific environments:- Production — Key can only access production compliance data
- Staging — Key can only access staging environment data
- All environments — Key can access data across all environments
Managing API Keys
Viewing Active Keys
The API Keys page displays all active keys with:| Column | Description |
|---|---|
| Name | The descriptive name you assigned |
| Permissions | Read-only, read-write, or admin |
| Created | When the key was created |
| Last used | When the key was last used to make an API call |
| Expires | Expiration date (if set) |
| Status | Active or revoked |
Revoking a Key
To immediately disable an API key:- Find the key in the API Keys list.
- Click Revoke.
- Confirm the action.
Revoking a key is permanent. If you need the same access restored, create a new key and update the consuming system with the new credentials.
Key Rotation
Regular key rotation limits the impact of a compromised key. The recommended rotation process:Update the consuming system
Replace the old key with the new key in your integration, CI/CD pipeline, or script.
Using API Keys
Include the API key in theAuthorization header of your HTTP requests:
Common Use Cases
| Use Case | Permission Needed | Description |
|---|---|---|
| Compliance dashboard | Read-only | Pull compliance scores and control status into an internal dashboard |
| Audit export | Read-only | Automate periodic export of evidence and test results for audit packages |
| CI/CD security gate | Read-only | Check compliance status before deploying to production |
| Evidence upload | Read-write | Automatically upload evidence from CI/CD pipelines or scripts |
| User provisioning | Admin | Automate user invitations and role assignments |
Security Best Practices
- Never commit API keys to version control. Use environment variables or a secrets manager.
- Use read-only keys whenever possible. Most integrations do not need write access.
- Set expiration dates. Keys without expiration dates become a security risk over time.
- Monitor the “last used” timestamp. Keys that have not been used in 90+ days should be reviewed and potentially revoked.
- Rotate keys regularly. Replace keys at least annually, or every 90 days for high-privilege keys.
- Revoke keys immediately when no longer needed. Do not leave unused keys active.
API Key Audit Trail
LowerPlane logs all API key management actions:- Key creation (who created it, when, with what permissions)
- Key usage (last used timestamp, request count)
- Key revocation (who revoked it, when)