Go to computer terminal for registration
KMS provides you with centralized control of your encryption keys. You can easily create new keys whenever you wish, and easily manage or rotate them.
KMS helps you protect secrets needed to access your applications, services, and IT resources, it makes you to easily rotate, manage, and retrieve sensitive data.
Each request you make to KMS is recorded in the logging system. The information recorded includes details of the user, time, data, API action and, when relevant, the key used.
KMS is specially designed so that no one can retrieve your plaintext keys from the services. The services uses hardware security modules (HSMs) to protect the confidentiality and integrity of your keys. Your plaintext keys are never written to disk and only ever used in volatile memory of the KMS for the time needed to perform your requested cryptographic operation. Keys created by KMS are never transmitted outside of the JD Cloud regions.
KMS uses real-time cross-regional backup and offline backup to make keys security and integrity, and uses distributed system to ensure high availability of services.