Top Rated AWS Key Management Service (KMS) Alternatives
36 AWS Key Management Service (KMS) Reviews
Overall Review Sentiment for AWS Key Management Service (KMS)
Log in to view review sentiment.
We have a policy where Bring Your Own Key is required for confidential data in the cloud and AWS has streamlined the process for us. Review collected by and hosted on G2.com.
When we import an encryption key for usage in another account that other account is not able to reference our key by key alias natively. It should be easy enough for AWS to add the ability to reference an encryption key by key alias across accounts. Review collected by and hosted on G2.com.
Ease of use. There can be a lot of overhead to managing secrets. You need to make them available for people and processes that should have access, while restricting access for nearly everyone else. There are lots of options out there for how to do this, but the fact that KMS is already bolted into so many of Amazon's service offerings, and the fact that they support KMS client SDKs for every relevant programming language, plus command line tools makes enterprise level encryption available to any project or organization already using AWS. Review collected by and hosted on G2.com.
Certain Client SDKs are painful to use. Having played with python and nodejs SDKs, i've found that example code is hard to find and I've not had great success with these SDKs. AWS Service integration, CLI usage, .NET and JAVA are all seamless which is why I reference ease of use as my favorite aspect of KMS. Review collected by and hosted on G2.com.
I like the Master key and Data key concept in KMS. this is very easy to implement and I like AWS UI to manage it. Review collected by and hosted on G2.com.
AWS should have been provided more c# samples to use all its features. Review collected by and hosted on G2.com.

The key rotation does not need to decrypt and re-encrypt the data that was encrypted by the key. Old keys are still available to decrypt the data and the newly encrypted data will use new keys. It has automatic key rotation that is essential for compliance purposes. It does not require configuration to start. Review collected by and hosted on G2.com.
KMS gives an easy rotation but you do not have much control. AWS will rotate it for you according to your own schedule annually. You can not force it. In addition, if you import your own keys, you must manage this key rotation on your own, which overrides the nice rotation service provided by AWS and, you must decrypt and re-encrypt the data encrypted with those keys. So keep this in mind if you are thinking about using your own keys. Review collected by and hosted on G2.com.

The ability to securely store keys and use them for encrypting apps and storage is unarguably the best feature of the AWS KMS. Within the AWS ecosystem the integration and interoperability is remarkable. Review collected by and hosted on G2.com.
Nothing that I can think of, the service is really straight forward and easy to use. Review collected by and hosted on G2.com.
Easy way to store your key pairs for use on EC2, Lambda, and a large amount of other assorted AWS services for almost no charge. Keeping track of keys on premise is dangerous and risky, beacuse it gives another system that you need to protect in order for your infrastructure to remain safe. through KMS, you can store all the keys that you need in AWS itself and therefore extend your security blanket to your keys as well. Review collected by and hosted on G2.com.
Not much. The UI and AWS console is not very intuitive and can be confusing at times. I would really like to see a redesign of the UI from AWS as it is needlessly complicated and incredibly slow for a select number of operations. Review collected by and hosted on G2.com.
I love the fact that we keep all of our keys in one place, and they're easily reachable via most of our internasl systems on an encrypted level. Review collected by and hosted on G2.com.
I dislike the pricing schema for it. Chargina on a per key model is simple, but illogical for larger companies to use. We have thousands of keys that we'd like to live inside of the system, but it's too expensive to justify. Review collected by and hosted on G2.com.
we have multiple products and for those can use different kms keys or share it depending upon environment Review collected by and hosted on G2.com.
I was able to create two kms with same name. had to delete one of those before i could proceed with using the right one. Review collected by and hosted on G2.com.
I love how easy it is to work with encryption keys. I love that metadata is saved with the key so there is not much information that is required to perform a decryption operation Review collected by and hosted on G2.com.
I don't like that root is preprovisioned in the kms key policy. I understand why but I feel like enabling iam access is something that should be done explicitly by the admin and not a default. Review collected by and hosted on G2.com.
-Easy to plug into application using AWS sdk
-Support for nearly All OS
-Good key rotation policy
-Lot of big and secure Applications trust KMS Review collected by and hosted on G2.com.
-Default key rotation policy is not ideal
-Could look confusing at first usage
-AWS UI is still for power user, newbies could struggle Review collected by and hosted on G2.com.