Key Management Service

Easily protect, manage, use, and audit your cryptographic keys on Alibaba Cloud

Safe and Reliable Key Lifecycle Management on the Cloud

Alibaba Cloud Key Management Service (KMS) provides secure and compliant key management and cryptography services to help you encrypt and protect sensitive data assets. KMS is integrated with a wide range of Alibaba Cloud services to allow you to encrypt data across the cloud and to control its distributed environment. KMS provides key usage logs via ActionTrail, supports custom key rotation, and provides HSMs that have passed FIPS 140-2 Level 3 or other relevant validation, to help you meet your regulatory and compliance needs.

Fully managed

Fully managed

KMS provides key management and cryptography services. You manage the lifecycle and permissions of keys, use them for encryption and signing while Alibaba Cloud fully manages the cryptographic infrastructure and ensures service availability, security, and reliability.

Availability, reliability, and elasticity

Availability, reliability, and elasticity

KMS processes your requests with low latency via redundant cryptographic modules across availability zones in each region and scales to meet your needs to create as many keys. You can bring your own key to KMS and keep a copy offline for more durability.

Security and Compliance

Security and Compliance

KMS ensures stringent protection of your keys on Alibaba Cloud with secure design and review. KMS helps you quickly meet regulatory and compliance requirements by offering managed HSMs that have passed FIPS 140-2 Level 3 or other relevant validation, by allowing you to configure custom key rotation policies, to manage permissions in RAM, and to track key usage in ActionTrail. You can pipe ActionTrail events to OSS or Log Service to integrate with SIEM solution for more analysis and threat detection.

Data Encryption for Integrated Cloud Services

Data Encryption for Integrated Cloud Services

KMS is integrated with a wide range of Alibaba Cloud services such as ECS, RDS, OSS, NAS, and MaxCompute. With minimum cost of key management, you can leverage KMS to encrypt data in these services and maintain control over their distributed compute and storage environment. With server-side encryption such as OSS SSE or database TDE, you control encryption behavior via KMS and RAM, while Alibaba Cloud handles the complication and pay for the execution of the encryption workload for you.

Custom Encryption and Digital Signatures

Custom Encryption and Digital Signatures

KMS encapsulates simplified cryptography and HSM APIs for you to easily encrypt data in your application for integrated security and compliance, further reducing the attack surface to sensitive data from adversaries. You can also use asymmetric keys for digital signing to ensure integrity of critical data.



With KMS, you only pay for the resources that you use, eliminating the need for HSM purchase and associated cost of continuous hardware operation, patching and replacements. KMS helps you reduce the cost of building and maintaining your own key management infrastructure.


Comprehensive Management Features

KMS provides rich key management features to meet all your needs.

Keys Generated in KMS or Imported from External Sources

You can generate keys in KMS or import Bring Your Own Keys (BYOKs) to managed HSMs. BYOKs allow you to keep additional offline key copies. Managed HSMs ensure that imported keys will not be exported.

Key Lifecycle Management and Automatic Key Rotation

You can enable or disable keys, or schedule a regular cycle to delete keys. For BYOK, you can delete keys at any time, or specify an automatic expiration policy. KMS allows you to configure custom rotation policies to automatically rotate encryption keys periodically and therefore enhance the security of keys.

Authentication, Authorization, and Auditing (AAA)

You can manage KMS user authentication and authorization policies through RAM. You can track and audit key usage through ActionTrail, or store key usage logs in OSS or Log Service for diverse scenarios such as long-term storage, data analysis, and SIEM integration.

Fully Managed HSMs

Managed HSMs provide a high security protection mechanism for keys.

HSM Certification and Compliance

KMS provides HSMs that have passed FIPS 140-2 Level 3 validation, running under FIPS-approved Level 3 mode of operation, or offers HSMs that have passed relevant validation to comply with local regulatory requirements.

Secure Generation of Keys

Managed HSMs use a secure and licensed random number generation algorithm. The algorithm uses high entropy seeds to generate key materials. This protects keys from being recovered or anticipated by malicious parties.

Hardware Protection of Keys

Managed HSMs protect keys in KMS through hardware mechanisms. The plaintext of keys is only processed inside HSMs for key operations. It is kept within the hardware security boundary of HSMs.

Integration with Other Alibaba Cloud Services

KMS can be integrated with multiple Alibaba Cloud services to provide native encryption experience and advanced security capabilities.

Entry-level Default Encryption

KMS allows each cloud service to automatically manage a dedicated encryption key. By default, cloud services can use this key without caring about its lifecycle and authorization policies.

Optional Sources for Encryption Keys

You can create keys in KMS or import external key materials, and authorize cloud services to employ user-managed keys for data encryption protection. Therefore, you obtain full control over keys by managing their permissions and lifecycle.

Auditing Key Usage by Cloud Services

Regardless of service-managed keys or user-managed keys, you can audit key usage by cloud services by calling KMS API operations on your behalf.

Simple and Effective Cryptographic Operations

KMS uses abstract cryptographic concepts and provides simple cryptographic operation APIs.

Envelope Encryption

With envelope encryption built in KMS, you can generate a secondary key and encrypt the CMK through a single API call.


KMS encapsulates authenticated encryption with associated data (AEAD). You can use encryption context to provide additional integrity and authenticity for encrypted data.

Digital Signature Verification

KMS can host asymmetric keys and provide digital signature verification algorithms based on asymmetric keys. KMS can be used in a wide range of scenarios such as identity verification, code signature, and blockchain.


Billing Items

KMS Editions Protection Level Fees (Per Key Version) API Fees (Per 10K Requests)
Cloud service managed keys Software Free Free monthly request quota: 20K
Above quota:
China Mainland: 0.08 USD
Overseas: 0.03 USD
Customer managed keys -- Basic Software 0.06 USD/per month China Mainland: 0.08 USD
Overseas: 0.03 USD
Customer managed keys -- Basic HSM 1.00 USD/per month China Mainland: 0.08 USD
Overseas: 0.03 USD
Customer managed keys -- Advanced Software 0.06 USD/per month China Mainland: 0.24 USD
Overseas: 0.15 USD
Customer managed keys -- Advanced HSM 1-2000: 2.50 USD/per month
2000+: 1.00 USD/per month
China Mainland: 0.24 USD
Overseas: 0.15 USD

Upgraded Support For You

1 on 1 Presale Consultation, 24/7 Technical Support, Faster Response, and More Free Tickets.

1 on 1 Presale Consultation

Consulting by experienced cloud experts.Learn More

24/7 Technical Support

Extended service time from 10 hours 5 days a week to 24/7. Learn More

6 Free Tickets per Quarter

The number of free tickets doubled from 3 to 6 per quarter. Learn More

Faster Response

Shorten after-sale response time from 36 hours to 18 hours. Learn More

Using Managed Hardware Security Modules (HSM)