Product Advantages

  • Service Integration

    DEW provides KMS, integrated with many of the Huawei Cloud extensive services including Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), and more.

    DEW provides KMS, integrated with many of the Huawei Cloud extensive services including Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), and more.

  • Dedicated HSM

    DEW provides CSCA certified or FIPS 140-2 validated level-3 HSM protection, guaranteeing high-performance encryption to meet your strict security requirements.

    DEW provides CSCA certified or FIPS 140-2 validated level-3 HSM protection, guaranteeing high-performance encryption to meet your strict security requirements.

  • Compliance

    With DEW, keys and random numbers are generated by the third-party validated HSMs. It is compliant with local and international laws and regulations.

    With DEW, keys and random numbers are generated by the third-party validated HSMs. It is compliant with local and international laws and regulations.

Application Scenarios

Key Management Service

KMS uses validated HSMs to protect your keys, so you can effortlessly create and manage keys for data encryption. It can be integrated with other Huawei Cloud services such as OBS, EVS, and IMS.


Advantages

  • Wide Application

    Integrates with OBS, EVS, IMS, and more to enable secure and easy data encryption.

  • Broad Capabilities

    Supports full management and lifecycle management of your keys.

  • Easy Integration

    Supports APIs, so you can call APIs to integrate KMS with your applications for data encryption.

  • Secure and Reliable

    Stores CMKs redundantly online, physically backs up root keys in multiple copies offline, and performs regular backups to ensure key persistence.

Related Services

Dedicated HSM

For encryption scenarios requiring strict compliance, you can use the FIPS 140-2 validated level-3 HSM to implement dedicated encryption.


Advantages

  • Regulatory Compliance

    HSMs provided by DEW are third-party certified or validated.

  • Performance Assurance

    Provides exclusive resource to ensure concurrent high-speed computing performance under different encryption protocols.

  • Superb Compatibility

    Provides industry-standard and application-integrated APIs, including PKCS #11, JCE, CNG, and more.

Related Services

Functions

  • Key Management Service

    Uses Hardware Security Modules (HSMs) to protect your keys. It seamlessly interworks with other cloud services to protect service data and can be used to develop encryption applications.

    Uses Hardware Security Modules (HSMs) to protect your keys. It seamlessly interworks with other cloud services to protect service data and can be used to develop encryption applications.

  • Dedicated HSM

    Caters to diverse encryption needs with high security and compliance.

    Caters to diverse encryption needs with high security and compliance.

  • Easy Management
    Easy Management

    You can use keys imported from offline or created on the KMS console, where you can enable, disable, or delete them as needed. Default keys are also listed on the console for convenient, centralized management.

    You can use keys imported from offline or created on the KMS console, where you can enable, disable, or delete them as needed. Default keys are also listed on the console for convenient, centralized management.

  • Comprehensive Encryption
    Comprehensive Encryption

    Dedicated HSM supports a range of cryptographic algorithms, including RSA, DSA, and ECDSA. It also provides industry-standard and application-integrated APIs, such as PKCS #11, JCE, CNG, and more. You can use dedicated subracks, power supply, bandwidth, and interfaces, meeting strict security requirements.

    Dedicated HSM supports a range of cryptographic algorithms, including RSA, DSA, and ECDSA. It also provides industry-standard and application-integrated APIs, such as PKCS #11, JCE, CNG, and more. You can use dedicated subracks, power supply, bandwidth, and interfaces, meeting strict security requirements.

Documentation

Sign up and start an amazing cloud journey

Try Free


http://www.vxiaotou.com