Aug SEP Oct
20
2019 2020 2021
success
fail

About this capture

COLLECTED BY

Collection: GDELT Project

TIMESTAMPS

The Wayback Machine - http://web.archive.org/web/20200920132319/https://cloud.google.com/security-key-management
 








Docs   Support  










Contact Sales   Get started for free
 










Why Google  

More  



Solutions  

More  



Products  

More  



Pricing  

More  



Getting started  

More  



Docs  

Support  

Console  

Contact Sales  

Get started for free  





Groundbreaking solutions. Transformative know-how.  

Learn more  

Why Google Cloud  

Choosing Google Cloud  

Trust and security  

Open cloud  

Global infrastructure  

Analyst reports  

Customer stories  

Partners  

Google Cloud Blog  

Events  



Industry Solutions  

Retail  

Financial Services  

Healthcare and Life Sciences  

Media and Entertainment  

Telecommunications  

Gaming  

Manufacturing  

Energy  

Government  

Education  

Small and Medium Business  

Cloud Natives  

See all solutions  

Application Modernization  

Hybrid and Multi-cloud Application Platform  

Cloud-Native App Development  

Serverless solutions  

DevOps  

Configuration Management  

Continuous Delivery (CD)  

Continuous Integration (CI)  

Infrastructure as Code  

Secrets Management  

Mainframe Modernization  

Hosting  

Artificial Intelligence  

Build and Use AI  

Contact Center AI  

Document AI  

Cloud Talent Solution  

Business Application Platform  

New Business Channels Using APIs  

Unlocking Legacy Applications Using APIs  

Open Banking APIx  

Data Management  

Database Migration  

Database Modernization  

Google Cloud Databases  

Migrate Oracle workloads to Google Cloud  

Open Source Databases  

SQL Server on Google Cloud  

Digital Transformation  

Business Continuity  

Digital Innovation  

Operational Efficiency  

COVID-19 Solutions  

COVID-19 Solutions for the Healthcare Industry  

Infrastructure Modernization  

VM Migration  

SAP on Google Cloud  

High Performance Computing  

Windows on Google Cloud  

Data Center Migration  

Marketing Technology  

Active Assist  

Virtual Desktops  

Productivity and Collaboration  

G Suite  

G Suite Essentials  

Cloud Identity  

Chrome Enterprise  

Cloud Search  

Security  

Application Security  

Security Analytics and Operations  

BeyondCorp Remote Access  

Smart Analytics  

Data Warehouse Modernization  

Stream Analytics  

Marketing Analytics  

Data Lake Modernization  

Business Intelligence  



Featured Products  

Compute Engine  

Cloud Storage  

Cloud SDK  

Cloud SQL  

Google Kubernetes Engine  

BigQuery  

Cloud CDN  

Dataflow  

Operations  

Cloud Run  

Cloud Functions  

See all products (100+)  

AI and Machine Learning  

Speech-to-Text  

Vision AI  

Text-to-Speech  

Cloud Translation  

Cloud Natural Language  

AutoML  

AI Platform  

Video AI  

AI Infrastructure  

Dialogflow  

AutoML Tables  

See all AI and machine learning products  

API Management  

Apigee API Platform  

Analyze APIs  

Monetize APIs  

Apigee Hybrid  

Apigee Sense  

Cloud Endpoints  

Developer Portal  

Apigee Healthcare APIx  

Apigee Open Banking APIx  

Cloud Healthcare API  

AppSheet  

Compute  

Compute Engine  

App Engine  

Cloud GPUs  

Migrate for Compute Engine  

Preemptible VMs  

Shielded VMs  

Sole-Tenant Nodes  

Bare Metal  

Recommender  

VMware Engine  

Cloud Run  

See all compute products  

Containers  

Google Kubernetes Engine  

Container Registry  

Container Security  

Cloud Build  

Deep Learning Containers  

Kubernetes Applications  

Artifact Registry  

Knative  

Cloud Run  

Cloud Code  

Data Analytics  

BigQuery  

Looker  

Dataflow  

Pub/Sub  

Dataproc  

Cloud Data Fusion  

Cloud Composer  

Data Catalog  

Dataprep  

Google Data Studio  

Google Marketing Platform  

Cloud Life Sciences  

Databases  

Cloud Bigtable  

Firestore  

Memorystore  

Cloud Spanner  

Cloud SQL  

Firebase Realtime Database  

Developer Tools  

Cloud SDK  

Container Registry  

Cloud Build  

Cloud Source Repositories  

Cloud Scheduler  

Tekton  

Cloud Tasks  

Cloud Code  

Tools for Visual Studio  

Tools for Eclipse  

Cloud Code for IntelliJ  

See all developer tools  

Healthcare and Life Sciences  

Apigee Healthcare APIx  

Cloud Healthcare API  

Cloud Life Sciences  

Hybrid and Multi-cloud  

Anthos  

Cloud Run for Anthos  

Google Cloud Marketplace for Anthos  

Migrate for Anthos  

Operations  

Cloud Build  

Traffic Director  

Apigee API Management  

Internet of Things  

Cloud IoT Core  

Edge TPU  

Management Tools  

Cloud Shell  

Cloud Console  

Cloud Deployment Manager  

Cloud Mobile App  

Cloud APIs  

Private Catalog  

Cost Management  

Media and Gaming  

Game Servers  

Zync Render  

Anvato  

OpenCue  

Migration  

BigQuery Data Transfer Service  

Cloud Data Transfer  

Cloud Foundation Toolkit  

Transfer Service  

Migrate for Anthos  

Migrate for Compute Engine  

Transfer Appliance  

VM Migration  

Networking  

Cloud Armor  

Cloud CDN  

Cloud DNS  

Cloud Load Balancing  

Cloud NAT  

Hybrid Connectivity  

Network Intelligence Center  

Network Service Tiers  

Network Telemetry  

Traffic Director  

Virtual Private Cloud  

Service Directory  

Operations  

Cloud Logging  

Cloud Monitoring  

Error Reporting  

Kubernetes Engine Monitoring  

Service Monitoring  

Cloud Trace  

Cloud Profiler  

Cloud Debugger  

Transparent Service Level Indicators  

Security and Identity  

Cloud IAM  

Assured Workloads  

Cloud Key Management  

Confidential Computing  

Security Command Center  

Cloud Data Loss Prevention  

Managed Service for Microsoft Active Directory  

Access Transparency  

Titan Security Key  

Secret Manager  

See all security and identity products  

Serverless Computing  

Cloud Run  

Cloud Functions  

App Engine  

Workflows  

Storage  

Cloud Storage  

Filestore  

Persistent Disk  

Cloud Storage for Firebase  

Local SSD  

Archival Storage  

Cloud Data Transfer  

G Suite Essentials  



Do more for less with Google Cloud  

Contact sales  

Google Cloud Platform  

Overview  

Price list  

Calculators  

Free on Google Cloud  

More Cloud Products  

G Suite  

Google Maps Platform  

Cloud Identity  

Apigee  

Firebase  

Zync Render  



Get started with Google Cloud  

Try GCP Free  

Get Started  

Resources to Start on Your Own  

Quickstarts  

GCP Marketplace  

Training  

Certification  

Get Help from an Expert  

Consulting  

Technical Account Management  

Find a Partner  

Become a Partner  

More ways to get started  






Products  





Jump to  
Cloud Key Management 







Cloud Key Management 



Manage encryption  keys on Google Cloud.  
Try Google Cloud free  

action/check_circle_24px  Created with Sketch.  
Deliver scalable, centralized, fast cloud key management  

action/check_circle_24px  Created with Sketch.  
Help satisfy compliance, privacy, and security needs
 

action/check_circle_24px  Created with Sketch.  
Apply hardware security modules (HSMs) effortlessly to  your most sensitive data
 

action/check_circle_24px  Created with Sketch.  
Use an external KMS to protect your data in Google Cloud  and separate the data from the key
 

action/check_circle_24px  Created with Sketch.  
Approve or deny any request for your encryption keys  based on clear and precise justifications
 





Customer-managed encryption keys (CMEK)

34:12  


VIDEO
Customer-managed encryption keys (CMEK)
 






Benefits
 



Scale your security globally  



Scale your application to Googles global footprint while  letting Google worry about the challenges of key  management, including managing redundancy and latency.
 


Help achieve your compliance  requirements

 

Easily encrypt your data in the cloud using  software-backed encryption keys, certified FIPS 140-2  Level 3 validated HSMs, customer-provided keys or an  External Key Manager. 
 


Leverage from integration with  Google Cloud products

 

Use customer-managed encryption keys (CMEK) to control  the encryption of data across Google Cloud products while  benefiting from additional security features such as  Google Cloud IAM and audit logs.
 






Key features
 

Key features 





Centrally manage encryption keys

A cloud-hosted key management service that lets you  manage symmetric and asymmetric cryptographic keys for  your cloud services the same way you do on-premises. You  can generate, use, rotate, and destroy AES256, RSA 2048,  RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic  keys.
 

Deliver hardware key security with  HSM
 
Toggle between software- and hardware-protected  encryption keys with the press of a button. Host  encryption keys and perform cryptographic operations in  FIPS 140-2 Level 3 certified HSMs. With this fully managed  service, you can protect your most sensitive workloads  without the need to worry about the operational overhead  of managing an HSM cluster.
 

Provide support for external keys  with EKM
 
Encrypt data in  BigQuery  and  Compute Engine  with encryption keys that are stored and managed in a  third-party key management system thats deployed outside  Googles infrastructure. External Key Manager allows you  to maintain separation between your data at rest and your  encryption keys while still leveraging the power of cloud  for compute and analytics.
 

Be the ultimate arbiter of access  to your data 

Key Access Justifications works with  Cloud EKM  to greatly advance the control you have over your data.  Its the only product that gives you visibility into every  request for an encryption key, a justification for that  request, and a mechanism to approve or deny decryption in  the context of that request. These controls are covered by  Googles integrity commitments  and are currently in  beta.  
View all features  





Documentation  




Documentation 










Google Cloud Basics 
Cloud Key Management Service documentation

Learn how to create,  import, and manage cryptographic keys and perform  cryptographic operations in a single centralized cloud  service.
 


Learn more  





Google Cloud Basics 
Cloud HSM documentation

Get an overview of  Cloud HSM and learn how to create and use  HSM-protected encryption keys in Cloud Key Management  Service.
 


Learn more  





Google Cloud Basics 
Cloud External Key Manager documentation

Find an overview of  Cloud External Key Manager (Cloud EKM).
 


Learn more  





Whitepaper 
Cloud Key Management Service deep dive


Learn more about the inner workings of the Cloud  KMS platform and how it helps you protect the keys  and other sensitive data that you store in Google  Cloud.




Learn more  





Best Practice 
Using customer-managed encryption keys (CMEK) with GKE  

Learn how to use  customer-managed encryption keys (CMEK) on Google  Kubernetes Engine (GKE).
 


Learn more  





Google Cloud Basics 
Using customer-managed encryption keys with Cloud SQL  

The CMEK feature lets  you use your own cryptographic keys for data at rest  in Cloud SQL, including MySQL, PostgreSQL, and SQL  Server.
 


Learn more  





Google Cloud Basics 
Using customer-managed encryption keys (CMEK) with  Dataproc

See how to use CMEK  to encrypt data on the PDs associated with the VMs in  your Dataproc cluster and/or the cluster  metadata.
 


Learn more  





Google Cloud Basics 
Using customer-managed encryption keys with Data Fusion  

Learn how  customer-managed encryption keys provide user control  over the data written by Cloud Data Fusion  pipelines.
 


Learn more  





Tutorial 
Security in Google Cloud

This course gives  participants broad study of security controls and  techniques on Google Cloud.
 


Learn more  





View all product documentation  











Use cases
 

Use cases 





Use case 

Support  regulatory compliance  

Cloud KMS, together with Cloud HSM and Cloud EKM, supports  a wide range of compliance mandates that call for specific  key management procedures and technologies. It does so in a  scalable, cloud-native way, without undermining the agility  of the cloud implementation. Various mandates call for  hardware encryption (HSM), keys being separated from data  (EKM), or keys being handled securely (KMS overall). Key  management is  compliant with FIPS 140-2.
 




Use case 

Manage  encryption keys via secure hardware  

Customers who are subject to compliance regulations may be  required to store their keys and perform crypto operations  in a FIPS 140-2 Level 3 certified device. By allowing  customers to store their keys in a FIPS certified HSM, they  are able to meet their regulators demand and maintain  compliance in the cloud. This is also critical for customers  seeking a level of assurance that the cloud provider cannot  see or export their key material.
 




Use case 

Manage  encryption keys outside the cloud  

Customers subject to regulatory or regional security  requirements need to adopt cloud computing while retaining  the encryption keys in their possession. External Key  Manager allows them to maintain separation between data at  rest and encryption keys while still leveraging the power of  cloud for compute and analytics. This is accomplished with  full visibility into who has access to the keys, when they  have been used, and where they are located.
 
EKM reference architecture





Use case 

Key Access  Justifications and EKM data flow  

Key Access Justifications gives Google Cloud customers  visibility into every request for an encryption key, a  justification for that request, and a mechanism to approve  or deny decryption in the context of that request. The use  cases focus on both enforcement and visibility for data  access.
 
KAJ diagram





View all technical guides  




All features
 


All features 




Symmetric and asymmetric key support Cloud KMS allows you to create, use, rotate, automatically rotate, and destroy AES256 symmetric and RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 asymmetric cryptographic keys. With HSM, encrypt, decrypt, and sign with AES-256 symmetric and RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 asymmetric cryptographic keys.
Create external keys with EKM Generate your external key using one of the following external key managers: Equinix, Fortanix, Ionic, Thales, and Unbound. Once you have linked your external key with Cloud KMS, you can use it to protect data at rest in BigQuery and Compute Engine.
Delay for key destruction Cloud KMS has a built-in 24-hour delay for key material destruction, to prevent accidental or malicious data loss.
Encrypt and decrypt via API Cloud KMS is a REST API that can use a key to encrypt, decrypt, or sign data such as secrets for storage.
High global availability Cloud KMS is available in several global locations and across multi-regions, allowing you to place your service where you want for low latency and high availability.
Automated and at-will key rotation Cloud KMS allows you to set a rotation schedule for symmetric keys to automatically generate a new key version at a fixed time interval. Multiple versions of a symmetric key can be active at any time for decryption, with only one primary key version used for encrypting new data. With EKM, create an externally managed key directly from the Cloud KSM console.
Statement attestation with HSM With Cloud HSM, verify that a key was created in the HSM with attestation tokens generated for key creation operations.
Integration with GKE Encrypt Kubernetes secrets at the application-layer in GKE with keys you manage in Cloud KMS. In addition, you can store API keys, passwords, certificates, and other sensitive data with the Secret Manager storage system.
Maintain key-data separation With EKM, maintain separation between your data at rest and your encryption keys while still leveraging the power of cloud for compute and analytics.
Key data residency If using Cloud KMS, your cryptographic keys will be stored in the region where you deploy the resource. You also have the option of storing those keys inside a physical Hardware Security Module located in the region you choose with Cloud HSM.
Key import You may be using existing cryptographic keys that were created on your premises or in an external key management system.  You can import them into Cloud HSM keys or import software keys into Cloud KMS.
Justified access Get a clear reason for every decryption request that will cause your data to change state from at-rest to in-use with Key Access Justifications (beta).
Automated policy Key Access Justifications (beta) lets you set automated policies that approve or deny access to keys based on specific justifications. Let your external key manager, provided by Google Cloud technology partners, take care of the rest.
Integrity commitment Controls provided by Key Access Justifications are covered by Google’s integrity commitments, so that you know they can be trusted.







Pricing
 


Pricing 




Cloud Key Management Service charges for usage and varies  based on the following products: Cloud Key Management  Service, Cloud External Key Manager, and Cloud HSM.




Product Price (US$)
Cloud KMS: active key versions $0.06 per month
Cloud KMS: key use operations (Encrypt/ Decrypt) $0.03 per 10,000 operations
Cloud KMS: key admin operations free
Cloud HSM: key versions (AES256, RSA2048) $1.00 per month
Cloud HSM: key versions (RSA 3072, RSA 4096)

0–2000 key versions: $2.50 per month

2001+ key versions: $1.00 per month

Cloud HSM: key versions (EC P256, EC P384)

0–2000 key versions: $2.50 per month

2001+ key versions: $1.00 per month

Cloud EKM: key versions $3.00 per month
Cloud EKM: key use operations $0.03 per 10,000 operations



If you pay in a currency other than USD, the prices listed in  your currency on  Google Cloud SKUs  apply.
 


View pricing details  




Partners
 



Partners 



To enable Key Access Justifications, implement  External Key Manager  with one of these industry-leading key management  vendors.
 








Fortanix logo






Ionic logo






Thales logo








A product or feature listed  on this page is in beta. For more information on our product  launch stages, see  here.  






Take the next  step 


Start  building on Google Cloud with $300 in free credits and 20+  always free products. 
Try Google Cloud free  




Need help getting started? 
Contact sales  


Work with a trusted partner 
Find a partner  


Continue browsing 
See all products  









Choosing Google Cloud  

Trust and security  

Open cloud  

Global infrastructure  

Customers and case studies  

Analyst reports  

Whitepapers  





GCP pricing  

G Suite pricing  

Maps Platform pricing  

See all products  





Infrastructure modernization  

Data management  

Application modernization  

Smart analytics  

Artificial Intelligence  

Security  

Productivity & work transformation  

Industry solutions  

DevOps solutions  

Small business solutions  

See all solutions  





GCP documentation  

GCP quickstarts  

Google Cloud Marketplace  

G Suite Marketplace  

Support  

Tutorials  

Training  

Certifications  

Google Developers  

Google Cloud for Startups  

System status  

Release Notes  





Contact sales  

Find a Partner  

Become a Partner  

Blog  

Events  

Podcast  

Community  

Press center  

Google Cloud on YouTube  

GCP on YouTube  

G Suite on YouTube  

Follow on Twitter  

Join User Research  

We're hiring. Join Google Cloud!  






About Google  

Privacy  

Site terms  

Google Cloud terms  

Sign up for the Google Cloud newsletter   Subscribe