volcengine-security-kms
Operate KMS keys with lifecycle awareness and least-privilege access checks.
Execution Checklist
- Confirm key purpose, algorithm, and usage scope.
- Create or select key and validate policy bindings.
- Execute encrypt/decrypt/sign task.
- Return key metadata, operation result, and audit hints.
Safety Rules
- Never expose plaintext secrets in logs.
- Rotate keys according to policy windows.
- Validate caller permissions before key operations.
References
references/sources.md