Product Advantages
Secret encryption
Secrets are encrypted by KMS before storage. Encryption keys are generated and protected by authenticated third-party HSM. When you retrieve secrets, they are transferred to local servers via TLS.
Secure secret retrieval
CSMS calls secret APIs instead of hard-coded secrets in applications. Secrets can be dynamically retrieved and managed. CSMS manages application secrets in a centralized manner to reduce breach risks.
Centralized secret management and control
IAM identity and permission management ensure only authorized users can retrieve and modify credentials. CTS monitors access to credentials. These services prevent unauthorized access to and breach of sensitive information.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.