Updated on 2023-01-31 GMT+08:00

Product Advantages

Secret encryption

Secrets are encrypted by KMS before storage. Encryption keys are generated and protected by authenticated third-party HSM. When you retrieve secrets, they are transferred to local servers via TLS.

Secure secret retrieval

CSMS calls secret APIs instead of hard-coded secrets in applications. Secrets can be dynamically retrieved and managed. CSMS manages application secrets in a centralized manner to reduce breach risks.

Centralized secret management and control

IAM identity and permission management ensure only authorized users can retrieve and modify credentials. CTS monitors access to credentials. These services prevent unauthorized access to and breach of sensitive information.