Stay organized with collections
Save and categorize content based on your preferences.
Introduction to Key Access Justifications
Key Access Justifications provides a justification for every request to access keys stored in
an external key manager. It lets you approve or deny the access request based on
the provided justification. Using Key Access Justifications with Cloud External Key Manager
provides visibility into requests for encryption keys that allows data to
change state from at-rest to in-use.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eKey Access Justifications validates each request for accessing keys in an external key manager.\u003c/p\u003e\n"],["\u003cp\u003eRequests are approved or denied based on the provided justification.\u003c/p\u003e\n"],["\u003cp\u003eUsing Key Access Justifications with Cloud External Key Manager provides insights into requests for encryption keys.\u003c/p\u003e\n"],["\u003cp\u003eKey Access Justifications offers the ability to review requests for keys used in transitioning data from an at-rest to in-use state.\u003c/p\u003e\n"]]],[],null,["# Introduction to Key Access Justifications\n=========================================\n\nKey Access Justifications provides a justification for every request to access keys stored in\nan external key manager. It lets you approve or deny the access request based on\nthe provided justification. Using Key Access Justifications with [Cloud External Key Manager](/kms/docs/ekm)\nprovides visibility into requests for encryption keys that allows data to\nchange state from at-rest to in-use.\n\nFor more information, see [Overview of Key Access Justifications](/assured-workloads/key-access-justifications/docs/overview).\n\nTo learn about the core principles behind Google Cloud's administrative access\ncontrols, see [Overview of administrative access controls](/assured-workloads/cloud-provider-access-management/docs/administrative-access)."]]