Seracle Key Management Service (KMS)
Seracle Key Management Service (KMS) is secure and resilient that makes it easy for you to create and manage cryptographic keys and control their use across a wide range of Seracle services and in your applications.
Durability and physical security
Sercale KMS is fully managed and controls access to your encrypted data by defining permissions to use keys while enforcing your permissions in order to handle the durability and physical security of your keys.
KMS Integrated Seracle Services
Seracle KMS is integrated with our services to simplify using your keys to encrypt data across your AWS workloads. Seracle Encrypted SDK to enable you to used KMS-protected data encryption keys to encrypt locally within your applications.
Digitally sign data
KMS enables users to perform digital signing operations with asymmetric key pairs to ensure the integrity of data and also verifies the signatures whether they have a Seracle account or not.
The security and quality controls
The security measures in KMS have been certified under multiple compliance schemes to simplify your own compliance obligations.
Symmetric and asymmetric key support
Cloud KMS allows you to create, use, rotate, automatically rotate, and destroy symmetric and asymmetric cryptographic keys. Cloud KMS is a REST API that can use a key to encrypt, decrypt, or sign data such as secrets for storage.
High global availability
Cloud KMS is available in several global locations and across multi-region, allowing you to place your service where you want for low latency and high availability.
Key data residency
If using Cloud KMS, your cryptographic keys will be stored in the region where you deploy the resource. You may be using existing cryptographic keys that were created on your premises or in an external key management system.
Key Access Justifications allows you to set automated policies that approve or deny access to keys based on specific justifications.
Seracle supports KMS to provide scalability in managing encryption keys and credentials along with security such that the key isn’t stored or managed by Seracle.