When TDE is used, periodic rotation of encryption keys is an important feature. Key rotation can be a regulatory requirement whenever encryption is used. For example, MongoDB docs read:
Most regulatory requirements mandate that a managed key used to decrypt sensitive data must be rotated out and replaced with a new key once a year.
Since the operator provides TDE, it should also provide a way to rotate the encryption keys.
Since key file is currently used by the operator, the only way to rotate the key is to remove a node from the replica set, destroy the data directory, change the key, then add the node to the replica set. That clones all the existing data and will encrypt it with the new key. I have found no way to do that in the current operator implementation, save maybe for using the DR capabilities.
When TDE is used, periodic rotation of encryption keys is an important feature. Key rotation can be a regulatory requirement whenever encryption is used. For example, MongoDB docs read:
Since the operator provides TDE, it should also provide a way to rotate the encryption keys.