Altering encrypted tables
Altering an encrypted table can involve deleting and recreating views and triggers as well as decrypting and encrypting data. Following is the list of tasks that can be performed on an encrypted table:
Don'ts
We strongly discourages you from manually modifying any of the metadata tables associated with CDP. Doing so could result in undesired behavior.
Likewise, you should practice caution when modifying the base table. For example, if view and triggers for a particular table are created via CDP, and if these views are deleted manually, you cannot restore the table or decrypt the column(s) in the table. Likewise, once you have encrypted column(s) in a table, you should not do any of the following:
Drop or rename the encrypted table
Drop or rename the encrypted column
Change the data type or extend the length of an encrypted column
Modify the data type of the encrypted column
Rename the IV column
Rename a view created
Rename a trigger created
Please note that this is not an exhaustive list of the things you can do to put your encrypted database into a dysfunctional state.