Accessing the API
Access the API from authenticated code platforms.
Create keyrings and keys.
Enabling and disabling key versions
Enable and disable key versions for use in encryption operations.
Destroying and restoring key versions
Destroy and restore key version material.
Rotate keys automatically and manually.
Encrypting and decrypting
Encrypt content using Cloud KMS keys, and decrypt content encrypted by Cloud KMS.
Re-encrypt content using a new key version.
Store secrets encrypted with Cloud KMS.
Set up IAM roles and permissions to secure your Cloud KMS resources.
Using Cloud Audit Logging
Set up Cloud Audit Logging for Cloud KMS.