A guardpoint manages access to a single Workspace with an encryption key. You set a guardpoint as part of the encryption process to create additional security layer. You should generate a guardpoint for each Workspace. 

Keys are used to encrypt data and keys should be updated (rotated) at a regular interval to comply with your company's security policy.

The purpose of key rotation is to retire an encryption key and replace it with a recently-generated, cryptographic key. 

Event codeEvent message
DSM-071
displays as: 
DSM-DAO0071I 
Create a key pair with a key
DSM-229
displays as: 
DSM-DAO0229I 
Add a guardpoint with a policy
DSM-231
displays as: 
DSM-DAO0231I 
Add a group guardpoint
DSM-235
displays as: 
DSM-DAO0235I 
Update a guardpoint
DSM-238
displays as: 
DSM-DAO0238I 
Delete a group guardpoint
DSM-240
displays as: 
DSM-DAO0240I 
Delete a symmetric key with a key 
DSM-281
displays as: 
DSM-DAO0281I 
Delete an online policy
DSM-501
displays as:
DSM-DAO0501I
Marked guardpoint pending delete with a policy
DSM-502
displays as:
DSM-DAO0502I
Delete a pending guardpoint with a policy 

The associated object ID for each event is the user ID associated with the action.

In addition to the guardpoint introduction above, a guardpoint specifies the list of folders of the paths to be protected. Security policies control file folder access and encryption within the guardpoint.