Secret Manager overview  |  Secret Manager Documentation  |  Google Cloud (2024)

  • Home
  • Secret Manager
  • Documentation
  • Guides
Stay organized with collections Save and categorize content based on your preferences.

Secret Manager is a secrets and credential management servicethat lets you store and manage sensitive data such as API keys, usernames, passwords,certificates, and more.

A secret is a global resource that contains a collection ofmetadata and secret versions. The metadata can include replication locations,labels, annotations, and permissions. Secret versionsstore the actual secret payload, such as an API key or credential.

Using Secret Manager, you can do the following:

  • Manage rollback, recovery, and auditing using versions: Versions help youmanage gradual rollouts and emergency rollback, If a secret is accidentally changedor compromised, you can revert to a previous, known-good version. This minimizespotential downtime and security breaches. Versioning maintains a historical recordof changes made to a secret, including who made the changes and when. It helps youaudit secret data and track any unauthorized access attempts. You can pin secretversions to specific workloads and add aliasesfor easier access to secret data. You can also disable ordestroy secret versions thatyou don't require.

  • Encrypt your secret data in transit and at rest: All secrets are encryptedby default, both in transit using TLS and at rest with AES-256-bit encryptionkeys. For those requiring more granular control, you can encrypt your secret datawith Customer-Managed Encryption Keys (CMEK). UsingCMEK, you can generate new encryption keys or import existing ones to meet your specificrequirements.

  • Manage access to secrets using fine-grained Identity and Access Management (IAM) roles and conditions:With IAM roles and permissions,you can provide granular access to specificSecret Manager resources. You can segregate responsibilities for accessing,managing, auditing, and rotating secrets.

  • Ensure high availability and disaster recovery with secret replication: Youcan replicate your secrets across multipleregions to ensure high availability and disaster recovery for your applicationsregardless of their geographic location. You can choose between the following replication policies:

    • Automatic: Google decides the regionsconsidering availability and latency. You are only charged for one location.
    • User Managed: You canselect a custom set of regions depending on your requirements. You are charged per location.
  • Rotate secrets automatically to meet your security and compliance requirements:Rotating your secrets protects againstunauthorized access and data breaches. Regularly changing your secrets reduces the riskof stale or forgotten secrets and ensures compliance with many regulatory frameworksthat require periodic rotation of sensitive credentials.

  • Enforce data residency using regional secrets(Preview):Data residency requiresthat certain types of data, often belonging to specific individuals ororganizations, be stored within a defined geographic location. You can createregional secrets and storeyour sensitive data within a specific location to comply with data sovereignty lawsand regulations.

Difference between secrets management and key management

Secrets management and key management are both critical components of data security,but they serve distinct purposes and handle different types of sensitive information.The choice between secrets management and key management depends on your specific needs.If you want to securely store and manage confidential data, a secrets management systemis the right tool. If you want to manage encryption keys and perform cryptographic operations,a key management system is the better choice.

You can use the following table to understand the key differences between Secret Managerand a key management system, such as Cloud KMS.

Feature Secret Manager Cloud Key Management Service
Primary function Store, manage, and access secrets as binary blobs or text strings Manage cryptographic keys and use them to encrypt or decrypt data
Data stored Actual secret values. With the appropriate permissions, you can view the contents of the secret. Cryptographic keys. You can't view, extract, or export the actual cryptographic secrets (the bits and bytes) that are used for encryption and decryption operations.
Encryption Encrypts secrets at rest and in transit (using Google-managed or customer-managed keys) Provides encryption and decryption capabilities for other services
Typical use cases Store configuration information such as database passwords, API keys, or TLS certificates needed by an application at runtime Handle large encryption workloads, such as encrypting rows in a database or encrypting binary data such as images and files. You can also use Cloud KMS to perform other cryptographic operations such as signing and verification.

What's next

  • Learn how tocreate a secret.
  • Learn how to add a secret version.
  • Learn how to edit a secret.
  • Learn about quotas and limitations.
  • Learn about best practices.

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2024-09-10 UTC.

Secret Manager overview  |  Secret Manager Documentation  |  Google Cloud (2024)
Top Articles
Is Saving 10 Times Your Annual Income Enough For Retirement? - WiserAdvisor
Guide to Passive and Active Investing: Comparing the Advantages and Disadvantages of Passive (e.g., Index) and Active Investing 🔄📊
Sprinter Tyrone's Unblocked Games
What spices do Germans cook with?
Wisconsin Women's Volleyball Team Leaked Pictures
Kraziithegreat
Nfr Daysheet
BULLETIN OF ANIMAL HEALTH AND PRODUCTION IN AFRICA
Riegler & Partner Holding GmbH auf LinkedIn: Wie schätzen Sie die Entwicklung der Wohnraumschaffung und Bauwirtschaft…
Chastity Brainwash
Shuiby aslam - ForeverMissed.com Online Memorials
Washington Poe en Tilly Bradshaw 1 - Brandoffer, M.W. Craven | 9789024594917 | Boeken | bol
Lonadine
Darksteel Plate Deepwoken
Swedestats
Boston Gang Map
Weepinbell Gen 3 Learnset
Hennens Chattanooga Dress Code
Bible Gateway passage: Revelation 3 - New Living Translation
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Parc Soleil Drowning
Dtlr Duke St
Routing Number For Radiant Credit Union
Koninklijk Theater Tuschinski
Craigslist Wilkes Barre Pa Pets
4 Methods to Fix “Vortex Mods Cannot Be Deployed” Issue - MiniTool Partition Wizard
Radical Red Ability Pill
Cowboy Pozisyon
Leben in Japan – das muss man wissen - Lernen Sie Sprachen online bei italki
Downtown Dispensary Promo Code
Hwy 57 Nursery Michie Tn
Maths Open Ref
Mastering Serpentine Belt Replacement: A Step-by-Step Guide | The Motor Guy
Everything You Need to Know About Ñ in Spanish | FluentU Spanish Blog
Egg Crutch Glove Envelope
Fbsm Greenville Sc
The Menu Showtimes Near Amc Classic Pekin 14
Spy School Secrets - Canada's History
Baddies Only .Tv
Beaver Saddle Ark
Western Gold Gateway
Hingham Police Scanner Wicked Local
Heelyqutii
Mckinley rugzak - Mode accessoires kopen? Ruime keuze
A Comprehensive 360 Training Review (2021) — How Good Is It?
Brandon Spikes Career Earnings
888-822-3743
Cvs Coit And Alpha
Vci Classified Paducah
Haunted Mansion Showtimes Near Millstone 14
303-615-0055
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6477

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.