Product Advantages
Secret encryption
Secrets are encrypted by KMS before storage. Encryption keys are generated and protected by authenticated third-party HSM. When you retrieve secrets, they are transferred to local servers via TLS.
Secure secret retrieval
CSMS calls secret APIs instead of hard-coded secrets in applications. Secrets can be dynamically retrieved and managed. CSMS manages application secrets in a centralized manner to reduce breach risks.
Centralized secret management and control
IAM identity and permission management ensure only authorized users can retrieve and modify credentials. CTS monitors access to credentials. These services prevent unauthorized access to and breach of sensitive information.
Secret change notification
SMN notifies users of basic secret event changes in a timely manner. FunctionGraph is used to configure functions to automatically update or rotate secrets.
Last Article: Functions
Next Article: Application Scenarios
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.