Updated on 2025-11-10 GMT+08:00

Functions

KMS is a secure, reliable, and easy-to-use cloud service that helps you create, manage, and protect keys easily.

It uses Hardware Security Modules (HSMs) to protect keys. All keys are protected by root keys in HSMs to avoid key leakage. The HSMs meet the FIPS 140-2 Level 3 security requirements.

It also controls access to keys and records all operations on keys with traceable logs. In addition, it provides use records of all keys, meeting your audit and regulatory compliance requirements.

Key Lifecycle Management

KMS allows you to manage the lifecycle of keys, including creating, viewing, enabling, disabling a key, as well as scheduling and canceling the deletion of a custom key.

For details about key management types and key algorithms supported by KMS, see KMS Overview.

Data Encryption and Decryption

KMS allows you to encrypt and decrypt small-size data that is not larger than 4 KB and large-size data. For details, see Using KMS for Encryption.

Signature and Verification

Signature verification is an encryption mechanism that ensures data transmission security and integrity, preventing information from being tampered or forged during transmission. This function can be called only through an API.

Key Alias

Alias is the short name of a user key, which is an identifier of the key. You can use the alias as the key ID during API calling. The original key alias is not used as the key name.

Key Tags

Tags are used to identify keys. You can add tags to custom keys to classify and track custom keys and summarize the usage of custom keys by tag.

Key Rotation

KMS provides key rotation. You can rotate keys periodically to improve the security of your keys and service data. By default, automatic key rotation is disabled for a custom key. Every time you enable key rotation, KMS automatically rotates custom keys based on the rotation period you set.

Key Grant

You can create a grant for other IAM users or accounts. You can create a maximum of 100 grants for a custom key.

Multi-Region Keys

You can create a replica key across regions. A replica key is the key generated by replicating the master key in DEW. The replica key and the master key share the same key materials. It can be used for cross-region data encryption and decryption. It ensures flexibility and high availability in DEW, but requires proper management to ensure security and compliance.

Hardware True Random Number Generation

A device that generates true random numbers through physical processes instead of computer programs. Random numbers ranging from 8 bits to 8,192 bits can be generated by calling APIs.