Skip to content
Navigation Menu
IBM Cloud
  • PrivacyPrivacy
  • CatalogCatalog
  • Cost EstimatorCost Estimator
    • HelpHelp
      • Docs
  • Log in
  • Sign up
  • Privacy
  • Catalog
  • Cost Estimator
  • Help
    • Docs

  • Navigation settings

Error

Change theme

This feature is in early stage, some parts of the platform might not fully support different themes yet.

  1. Catalog

Key Protect

Create or manage cryptographic keys in the cloud to protect data at rest.

  • Date of last update: 03/05/2026
  • Docs
  • API docs
  • Get help
  • Service
  • IBM
  • 03/05/2026
  • Security
  • EU Supported
  • Financial Services Validated
  • HIPAA Enabled
  • IAM-enabled
  • Service Endpoint Supported
  • API docs
  • Docs
  • Get help
  • Terms

Pricing plans

PlanFeatures and capabilitiesPricing

  • Service
  • IBM
  • 03/05/2026
  • Security
  • EU Supported
  • Financial Services Validated
  • HIPAA Enabled
  • IAM-enabled
  • Service Endpoint Supported
  • API docs
  • Docs
  • Get help
  • Terms

Summary

Key Protect is a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM).

Features and capabilities

Bring your encryption keys to the cloud

Fully control and strengthen your key management practices by securely exporting symmetric keys from your internal key management infrastructure into IBM Cloud.

Robust security

Provision and store keys using FIPS 140-2 Level 3 certified hardware security modules (HSMs). Leverage Identity and Access Management (IAM) roles to provide fine-grain access control to your keys.

Control and visibility

Use the IBM Cloud Monitoring service and Activity Tracker to measure how users and applications interact with Key Protect.

Simplified billing

Track subscription and credit spending for all accounts from a single view.

Self-managed encryption

Create or import root and standard keys protect your data.

Flexibility

Apps on or outside IBM Cloud can integrate with the Key Protect APIs. Key Protect integrates easily with a variety of IBM database, storage, container, and ingestion services.

Built-in protection

Deleted keys, and their encrypted data, can never be recovered. Manage your user roles, key states, and set a rotation schedule that works for your use case using the UI, CLI, or API.

Application-independent

Generate, store, retrieve and manage keys independent of application logic.

Cross-region replication

Key Protect with Cross-region Resiliency offers enhanced availability through cross-region replication and automatic failover.

Getting support

Support as provided through IBM Cloud support plans.

https://cloud.ibm.com/docs/key-protect
Support locations

Support locations refer to all of the countries in which product support teams are located.

  • India
  • United States
  • You must wait 1 hour after you contact this product's support before you can begin the escalation process.

    Copy

    1 hour

Summary

Key Protect

    Already have an account? Log in