about us

Key Management Service

2025-12-12 21:03

Key Management Service (KMS) is a security management service that enables you to easily create and manage keys, ensuring their confidentiality, integrity, and availability. It meets the key management needs of users across multiple applications and business scenarios while complying with regulatory and compliance requirements. As a professional Cloud Encryption Service, its Cloud Key Escrow capability supports a variety of operations such as key creation, enabling, disabling, and alias configuration. Combined with Key Rotation Management (disabled by default; when enabled, CMKs are automatically exchanged annually), it ensures key security and business continuity. The Data Encryption Key (DEK) plays a critical role in envelope encryption scenarios, enabling efficient local symmetric encryption of business data while transmitting only the DEK to the KMS server for encryption and decryption with CMKs, balancing performance and security. Compliant Key Management is one of its core strengths, generating and protecting keys using third-party certified Hardware Security Modules (HSMs) and meeting multiple compliance certifications to satisfy regulatory requirements. Additionally, the Cloud Encryption Service seamlessly integrates with Tencent Cloud services such as Object Storage and Cloud Databases, and works in conjunction with Access Management and Cloud Audit to achieve permission control and operational auditing. This ensures that Cloud Key Escrow, Key Rotation Management, and the use of Data Encryption Keys all comply with compliance standards, adapting to diverse scenarios such as sensitive data encryption and key import, making it a core support for enterprise data security encryption.

Cloud Encryption Service

Q: What are the core management capabilities of Cloud Encryption Service (KMS)? How do Cloud Key Escrow and Key Rotation Management work together, and what role does the Data Encryption Key play?

A: The core management capabilities of Cloud Encryption Service (KMS) include Cloud Key Escrow, Key Rotation Management, Compliant Key Management, and Data Encryption Key collaboration. Among these, the synergy between Cloud Key Escrow and Key Rotation Management is key to ensuring key security. Cloud Key Escrow provides users with full lifecycle key management (creation, enabling, disabling, etc.), while Key Rotation Management ensures key updates through CMK automatic exchange (once per year) without affecting the decryption of old ciphertexts. Together, they make the key management of the Cloud Encryption Service more secure and continuous. The Data Encryption Key (DEK) is central to envelope encryption scenarios. The Cloud Encryption Service uses DEKs to efficiently encrypt large volumes of data: business data is locally encrypted with DEKs, and the DEKs are then encrypted and stored by KMS using CMKs. This reduces business access latency while leveraging the permission control of Cloud Key Escrow to protect DEK security. Compliant Key Management permeates the entire process, ensuring that Cloud Key Escrow, Key Rotation Management, and the use of Data Encryption Keys all comply with compliance requirements, making the management capabilities of the Cloud Encryption Service both secure and compliant.


Cloud Key Escrow

Q: How is Compliant Key Management reflected in Cloud Encryption Service (KMS)? How does it meet enterprises' compliance and encryption needs through Cloud Key Escrow and Data Encryption Keys?

A: The Compliant Key Management of Cloud Encryption Service (KMS) is reflected in three core dimensions: hardware security, compliance certifications, and operational auditing. Keys are generated and protected using third-party certified HSMs, secure data transmission protocols are employed, and multiple compliance certifications are obtained. Integration with Cloud Audit records all key operations, ensuring traceability for compliance purposes. Cloud Key Escrow serves as the vehicle for Compliant Key Management, implementing fine-grained permission control (integrated with Access Management) to restrict key access and prevent unauthorized operations. Data Encryption Keys (DEKs) fulfill compliance requirements in encryption scenarios. In sensitive data encryption scenarios, DEKs protect sensitive data smaller than 4KB (such as keys and certificates). In envelope encryption scenarios, DEKs efficiently handle large volumes of data, and the encryption and decryption of DEKs are managed by CMKs from the Cloud Encryption Service, ensuring full compliance. This model of "compliance framework + escrow capability + encryption collaboration" allows the Cloud Encryption Service to meet enterprise data encryption needs while easily passing regulatory assessments through the synergy of Compliant Key Management, Cloud Key Escrow, and Data Encryption Keys.


Data Encryption Key



Q: When enterprises choose Cloud Encryption Service (KMS) for Cloud Key Escrow, is Key Rotation Management necessary? How do Data Encryption Keys and Compliant Key Management provide dual protection for business encryption?


A: Key Rotation Management is crucial for Cloud Key Escrow and is a core feature of Cloud Encryption Service (KMS) that enhances key security. When enabled, CMKs are automatically exchanged annually, ensuring the security of key updates without affecting the decryption of old ciphertexts. This further elevates the security level of Cloud Key Escrow by mitigating the risk of long-term key usage leading to potential leaks. Data Encryption Keys (DEKs) and Compliant Key Management together provide dual protection of "encryption + compliance." DEKs handle the actual encryption of business data (efficiently processed locally), reducing security risks during data transmission, while the security of DEKs relies on the protection of CMKs in Cloud Key Escrow. Compliant Key Management, on the other hand, ensures that the entire process of Cloud Key Escrow, Key Rotation Management, and the use of Data Encryption Keys complies with regulatory requirements through hardware protection via HSMs, compliance certifications, and operational auditing. The synergy between these two components enables the Cloud Encryption Service to offer efficient encryption capabilities (relying on DEKs) while meeting enterprise compliance needs through Compliant Key Management. Meanwhile, Key Rotation Management continuously strengthens the security of Cloud Key Escrow. Together, these three aspects constitute the core value of the Cloud Encryption Service.



Get the latest price? We'll respond as soon as possible(within 12 hours)
This field is required
This field is required
Required and valid email address
This field is required
This field is required
For a better browsing experience, we recommend that you use Chrome, Firefox, Safari and Edge browsers.