


In conjunction with the Key Management Service(KMS), the customer's sensitive information is encrypted and stored in key-value form. Users can use encryption keys generated by KMS to protect their information more securely.
Access control through Identity and Access Management(IAM) and IP-based access control allow for more granular security policies for Secret.
Monitoring records Secret changes, and labels allow you to track the history of past versions of Secret.


Whether you’re looking for a specific business solution or just need some questions answered, we’re here to help