| Aug | SEP | Oct |
| 20 | ||
| 2019 | 2020 | 2021 |
COLLECTED BY
Collection: GDELT Project
Tekton
Kubernetes-native resources for declaring CI/CD pipelines.
Cost Management
Tools for monitoring, controlling, and optimizing your costs.
●Media and Gaming
Zync Render
Platform for 3D modeling and rendering on Google Cloud infrastructure.
Anvato
Media content platform for OTT services and video streaming.
OpenCue
Open source render manager for visual effects and animation.
| Symmetric and asymmetric key support | Cloud KMS allows you to create, use, rotate, automatically rotate, and destroy AES256 symmetric and RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 asymmetric cryptographic keys. With HSM, encrypt, decrypt, and sign with AES-256 symmetric and RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 asymmetric cryptographic keys. |
| Create external keys with EKM | Generate your external key using one of the following external key managers: Equinix, Fortanix, Ionic, Thales, and Unbound. Once you have linked your external key with Cloud KMS, you can use it to protect data at rest in BigQuery and Compute Engine. |
| Delay for key destruction | Cloud KMS has a built-in 24-hour delay for key material destruction, to prevent accidental or malicious data loss. |
| Encrypt and decrypt via API | Cloud KMS is a REST API that can use a key to encrypt, decrypt, or sign data such as secrets for storage. |
| High global availability | Cloud KMS is available in several global locations and across multi-regions, allowing you to place your service where you want for low latency and high availability. |
| Automated and at-will key rotation | Cloud KMS allows you to set a rotation schedule for symmetric keys to automatically generate a new key version at a fixed time interval. Multiple versions of a symmetric key can be active at any time for decryption, with only one primary key version used for encrypting new data. With EKM, create an externally managed key directly from the Cloud KSM console. |
| Statement attestation with HSM | With Cloud HSM, verify that a key was created in the HSM with attestation tokens generated for key creation operations. |
| Integration with GKE | Encrypt Kubernetes secrets at the application-layer in GKE with keys you manage in Cloud KMS. In addition, you can store API keys, passwords, certificates, and other sensitive data with the Secret Manager storage system. |
| Maintain key-data separation | With EKM, maintain separation between your data at rest and your encryption keys while still leveraging the power of cloud for compute and analytics. |
| Key data residency | If using Cloud KMS, your cryptographic keys will be stored in the region where you deploy the resource. You also have the option of storing those keys inside a physical Hardware Security Module located in the region you choose with Cloud HSM. |
| Key import | You may be using existing cryptographic keys that were created on your premises or in an external key management system. You can import them into Cloud HSM keys or import software keys into Cloud KMS. |
| Justified access | Get a clear reason for every decryption request that will cause your data to change state from at-rest to in-use with Key Access Justifications (beta). |
| Automated policy | Key Access Justifications (beta) lets you set automated policies that approve or deny access to keys based on specific justifications. Let your external key manager, provided by Google Cloud technology partners, take care of the rest. |
| Integrity commitment | Controls provided by Key Access Justifications are covered by Google’s integrity commitments, so that you know they can be trusted. |
| Product | Price (US$) |
|---|---|
| Cloud KMS: active key versions | $0.06 per month |
| Cloud KMS: key use operations (Encrypt/ Decrypt) | $0.03 per 10,000 operations |
| Cloud KMS: key admin operations | free |
| Cloud HSM: key versions (AES256, RSA2048) | $1.00 per month |
| Cloud HSM: key versions (RSA 3072, RSA 4096) |
0–2000 key versions: $2.50 per month 2001+ key versions: $1.00 per month |
| Cloud HSM: key versions (EC P256, EC P384) |
0–2000 key versions: $2.50 per month 2001+ key versions: $1.00 per month |
| Cloud EKM: key versions | $3.00 per month |
| Cloud EKM: key use operations | $0.03 per 10,000 operations |