Document Center
 
All Products
Search
  • Document Center
  • Key Management Service
  • Use Cases

This Product

  • This Product
  • All Products

    Key Management Service:Use Cases

    Document Center

    Key Management Service:Use Cases

    Last Updated:Jun 12, 2025

    Key Management Service (KMS) and Cloud Hardware Security Module (CloudHSM) provide use cases to meet various business requirements.

    Service

    References

    KMS

    • Migrate CMKs in default KMS instances to your KMS instances

    • Migrate keys across regions

    • Migrate secrets across regions

    • Use the instance RAM role attached to an ECS instance to securely access KMS

    • Query the usage records of keys and secrets

    • Use KMS to encrypt Kubernetes Secrets at rest

    • Use a KMS CMK to encrypt and decrypt data online

    • Use envelope encryption

    • Use Function Compute to rotate generic secrets

    • Deploy KMS Agent in ACK container environment to obtain credentials

    • Use KMS to build MaxCompute UDFs to encrypt and decrypt data

    • Use the exponential backoff method to retry requests

    CloudHSM

    • Secure SSL offloading based on CloudHSM

    • Configure an HSM cluster for a KMS instance of the hardware key management type

    • Copy a key between HSMs

    • Import key material into an HSM

    Thank you! We've received your feedback.