Skip to content
Navigation Menu

IBM Cloud

  • CatalogCatalog
  • Cost EstimatorCost Estimator
    • HelpHelp
      • Docs
  • Log in
  • Sign up
  • Catalog
  • Cost Estimator
  • Help
    • Docs

  • Navigation settings

Error

Change theme

This feature is in early stage, some parts of the platform might not fully support different themes yet.

Themes
  1. Catalog

Key Protect

Create or manage cryptographic keys in the cloud to protect data at rest.

  • Date of last update: 06/11/2025
  • Docs
  • API docs
  • Service
  • IBM
  • 06/11/2025
  • Security
  • EU Supported
  • Financial Services Validated
  • HIPAA Enabled
  • IAM-enabled
  • Service Endpoint Supported
  • Tokyo (jp-tok)
  • Dallas (us-south)
  • Sydney (au-syd)
  • Sao Paulo (br-sao)
  • Toronto (ca-tor)
  • Frankfurt (eu-de)
  • Madrid (eu-es)
  • London (eu-gb)
  • Osaka (jp-osa)
  • Washington DC (us-east)
  • API docs
  • Docs
  • Terms

Select key management service

Choose between multi-tenant and dedicated key management services

Key Protect

Multi-tenant

Bring Your Own Key for cloud data encryption with a multi-tenant key management service built on FIPS 140-2 Level 3 certified HSM.

Current
Hyper Protect Crypto Services

Dedicated

Keep Your Own Key for cloud data encryption with a dedicated key management service built on FIPS 140-2 Level 4 certified HSM.

Pricing plans

Prices shown are for country or location: United States
PlanFeatures and capabilitiesPricing
Standard
  • Create or manage cryptographic keys
  • Backed by certified hardware security modules
HIPAA Enabled
Financial Services Validated
  • $1.29162 USD/Key version

Key versions are created whenever a key is created or imported, and whenever an existing key is rotated. A key that has been rotated five times, for example, has six versions (five versions created by rotations plus the initial version).

This plan does not offer cross-regional resiliency.

  • Create or manage cryptographic keys
  • Backed by certified hardware security modules
HIPAA Enabled
Financial Services Validated

Key versions are created whenever a key is created or imported, and whenever an existing key is rotated. A key that has been rotated five times, for example, has six versions (five versions created by rotations plus the initial version).

This plan does not offer cross-regional resiliency.

Cross-region Resiliency
  • Managed keys have cross-region replication
  • Automated failover without endpoint change
EU Supported
HIPAA Enabled
Financial Services Validated
  • $100.00 USD/Base price
  • $2.16 USD/Key version
  • Service
  • IBM
  • 06/11/2025
  • Security
  • EU Supported
  • Financial Services Validated
  • HIPAA Enabled
  • IAM-enabled
  • Service Endpoint Supported
  • Tokyo (jp-tok)
  • Dallas (us-south)
  • Sydney (au-syd)
  • Sao Paulo (br-sao)
  • Toronto (ca-tor)
  • Frankfurt (eu-de)
  • Madrid (eu-es)
  • London (eu-gb)
  • Osaka (jp-osa)
  • Washington DC (us-east)
  • API docs
  • Docs
  • Terms

Summary

Key Protect is a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM).

Features and capabilities

Bring your encryption keys to the cloud

Fully control and strengthen your key management practices by securely exporting symmetric keys from your internal key management infrastructure into IBM Cloud.

Robust security

Provision and store keys using FIPS 140-2 Level 3 certified hardware security modules (HSMs). Leverage Identity and Access Management (IAM) roles to provide fine-grain access control to your keys.

Control and visibility

Use the IBM Cloud Monitoring service and Activity Tracker to measure how users and applications interact with Key Protect.

Simplified billing

Track subscription and credit spending for all accounts from a single view.

Self-managed encryption

Create or import root and standard keys protect your data.

Flexibility

Apps on or outside IBM Cloud can integrate with the Key Protect APIs. Key Protect integrates easily with a variety of IBM database, storage, container, and ingestion services.

Built-in protection

Deleted keys, and their encrypted data, can never be recovered. Manage your user roles, key states, and set a rotation schedule that works for your use case using the UI, CLI, or API.

Application-independent

Generate, store, retrieve and manage keys independent of application logic.

Cross-region replication

Key Protect with Cross-region Resiliency offers enhanced availability through cross-region replication and automatic failover.

Getting support


If you're experiencing issues with this product, go to the IBM Cloud Support Center and navigate to creating a case. Use the All products option to search for this product to continue creating the case or to find more information about getting support. Third party and community supported products might direct you to a support process outside of IBM Cloud.

Summary

Key Protect

  • Plan: Standard
Already have an account? Log in