[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# Encryption of secrets\n\nSecret Manager always encrypts your secret data before it is persisted to\ndisk. This page discusses the default encryption that Secret Manager\nperforms. To learn more about Google Cloud encryption options, refer to\n[Encryption at rest](/docs/security/encryption/default-encryption).\n\nSecret Manager manages server-side encryption keys on your behalf using\nthe same hardened key management systems that we use for our own encrypted data,\nincluding strict key access controls and auditing. Secret Manager\nencrypts user data at rest using AES-256. There is no setup or\nconfiguration required, no need to modify the way you access the service, and no\nvisible performance impact. Your secret data is automatically and transparently\ndecrypted when accessed by an authorized user.\n\nThe Secret Manager API always communicates over a secure HTTP(S) connection.\n\nCustomer-managed encryption keys (CMEK)\n---------------------------------------\n\nCustomer-managed encryption keys (CMEK) refers to the ability to control and\nmanage the encryption keys used to protect data related to a Google Cloud\nservice.\n\nSee [CMEK documentation](/secret-manager/docs/cmek) for details on how to configure and use customer-managed encryption keys."]]