KMS uses a third-party certified hardware safety module (HSM), to generate keys and protect them. It also utilizes secure data transfer protocols and distributed clustered service deployment, hot backup, and hot backup to ensure availability. Multiple compliance schemes have accredited KMS' security and quality control practices. Key Management Service offers rich management features such as key creation, disabling, rotation settings and alias settings, key details viewing, modification, and enabling. KMS console integrates with CAM, Cloud Monitor, allowing you to easily create keys for access control. Logging is also available for key usage and management operations. KMS allows you use your own key to encrypt or decrypt sensitive data.