Overview

Benefits

Security and Compliance
KMS utilizes a certified third-party hardware security module (HSM) for the generation and safeguarding of keys. It employs secure data transfer protocols, distributed clustered service deployment, and hot backup to ensure uninterrupted availability. The security measures and quality control standards adhered to by KMS are endorsed by numerous compliance frameworks.

Rich function

Seamless Integration with Cloud Services

Easy Management
The KMS console seamlessly integrates with CAM and Cloud Monitor, facilitating effortless key creation for access control. Additionally, all management operations and key usage are meticulously logged for comprehensive monitoring and auditing.

Low Costs

Supports External Key Import
Features
Managed Key Services
KMS offers an extensive array of management functionalities, encompassing key creation, activation, deactivation, rotation settings, alias assignment, key details viewing, and relevant information modification. This empowers users to efficiently generate and safeguard keys.
Rich function
Permission Control
Built-in Audit
Scenarios
Sensitive Data Encryption
Envelope Encryption
Bring Your Own Key

Encryption of sensitive information stands as a fundamental feature of KMS, primarily employed to safeguard confidential data (under 4 KB in size) stored on server disks, including keys, certificates, and configuration files.

Envelope encryption stands as an efficient encryption and decryption method, particularly suited for handling extensive volumes of data. Utilizing envelope encryption within KMS streamlines the process by transferring only the data encryption keys (DEKs) to the KMS server, which are encrypted and decrypted using the Customer Master Key (CMK). Subsequently, all data undergoes processing with efficient local symmetric encryption, ensuring minimal disruption to user access.
The Bring Your Own Key (BYOK) solution enables the utilization of custom keys for encrypting and decrypting sensitive data stored in the Cloud. With BYOK implementation, you can create a Customer Master Key (CMK) devoid of key material, subsequently importing your own key to establish an external CMK. This external CMK can then be effectively managed and distributed alongside KMS.