Compatible services

This page provides a list of Google Cloud services that offer integrations withCloud KMS. These services generally fall under one of the followingcategories:

  • ACustomer-managed encryption key (CMEK) integrationallows you to encrypt the data at rest in that service using aCloud KMS key that you own and manage. Data protected with aCMEK key cannot be decrypted without access to that key.

  • ACMEK-compliant service either does not store data, oronly stores data for a short period of time, such as during batch processing.Such data is encrypted using an ephemeral key that only exists in memory andis never written to disk. When the data is no longer needed, the ephemeral keyis flushed from memory, and the data can't ever be accessed again. The outputof a CMEK-compliant service might be stored in a service that is integratedwith CMEK, such as Cloud Storage.

  • Your applications canuse Cloud KMS in other ways. Forexample, you can directly encrypt application data before transmitting orstoring it.

To learn more about how data in Google Cloud is protected at rest andhow customer-managed encryption keys (CMEK) work, seeCustomer-managed encryption keys (CMEK).

CMEK integrations

The following table lists services that integrate with Cloud KMS.All services in this list support software and hardware (HSM) keys.Products that integrate with Cloud KMS when using externalCloud EKM keys are indicated underEKM supported.

ServiceProtected with CMEKEKM supportedTopic
Agent AssistData at restYesCustomer-managed encryption keys (CMEK)
AlloyDB for PostgreSQLData written to databasesYesUsing customer-managed encryption keys
Anti Money Laundering AIData in AML AI instance resourcesNoEncrypt data using customer-managed encryption keys (CMEK)
ApigeeData at restNoIntroduction to CMEK
Apigee API hubData at restYesEncryption
Application IntegrationData at restYesUsing customer-managed encryption keys
Artifact RegistryData in repositoriesYesEnabling customer-managed encryption keys
Backup and DR ServiceBackup Vault ContainerYesManaging Backup Vault encryption
Backup and DR ServiceBackups at restYesManaging backup encryption
Backup for GKEData in Backup for GKEYesAbout Backup for GKE CMEK encryption
BigQueryData in BigQueryYesProtecting data with Cloud KMS keys
BigtableData at restYesCustomer-managed encryption keys (CMEK)
Cloud ComposerEnvironment dataYesUsing customer-managed encryption keys
Cloud Data FusionEnvironment dataYesUsing customer-managed encryption keys
Cloud Healthcare APICloud Healthcare API datasetsYesUse customer-managed encryption keys (CMEK)
Cloud LoggingData in the Log RouterYesManage the keys that protect Log Router data
Cloud LoggingData in Logging storageYesManage the keys that protect Logging storage data
Cloud RunContainer imageYesUsing customer-managed encryption keys with Cloud Run
Cloud Run functionsData in Cloud Run functionsYesUsing customer-managed encryption keys
Cloud SQLData written to databasesYesUsing customer-managed encryption keys
Cloud StorageData in storage bucketsYesUsing customer-managed encryption keys
Cloud TasksTask body and header at restYesUse customer-managed encryption keys
Cloud TPUPersistent disksNoEncrypt a TPU VM boot disk with a customer-managed encryption key (CMEK)
Cloud WorkstationsData on VM disksYesEncrypt workstation resources
Colab EnterpriseRuntimes and notebook filesNoUse customer-managed encryption keys
Compute EnginePersistent disksYesProtecting resources with Cloud KMS keys
Compute EngineSnapshotsYesProtecting resources with Cloud KMS keys
Compute EngineCustom imagesYesProtecting resources with Cloud KMS keys
Compute EngineMachine imagesYesProtecting resources with Cloud KMS keys
Customer Experience InsightsData at restYesCustomer-managed encryption keys (CMEK)
Database Migration Service Homogeneous MigrationsMySQL migrations - data written to databasesYesUsing customer-managed encryption keys (CMEK)
Database Migration Service Homogeneous MigrationsPostgreSQL migrations - Data written to databasesYesUsing customer-managed encryption keys (CMEK)
Database Migration Service Homogeneous MigrationsPostgreSQL to AlloyDB migrations - Data written to databasesYesAbout CMEK
Database Migration Service Homogeneous MigrationsSQL Server migrations - Data written to databasesYesAbout CMEK
Database Migration Service Heterogeneous MigrationsOracle to PostgreSQL data at restYesUse customer-managed encryption keys (CMEK) for continuous migrations
DataflowPipeline state dataYesUsing customer-managed encryption keys
DataformData in repositoriesYesUse customer-managed encryption keys
Dataplex Universal CatalogData at restYesCustomer-managed encryption keys
DataprocDataproc clusters data on VM disksYesCustomer-managed encryption keys
DataprocDataproc serverless data on VM disksYesCustomer-managed encryption keys
Dataproc MetastoreData at restYesUsing customer-managed encryption keys
DatastreamData in transitYesUsing customer-managed encryption keys (CMEK)
Dialogflow CXData at restYesCustomer-managed encryption keys (CMEK)
Document AIData at rest and data in useYesCustomer-managed encryption keys (CMEK)
Eventarc Advanced (Preview)Data at restYesUse customer-managed encryption keys (CMEK)
Eventarc StandardData at restYesUse customer-managed encryption keys (CMEK)
FilestoreData at restYesEncrypt data with customer-managed encryption keys
FirestoreData at restYesUse customer-managed encryption keys (CMEK)
Gemini Code AssistData at restNoEncrypt data with customer-managed encryption keys
Gemini Enterprise - NotebookLM EnterpriseData at restNoCustomer-managed encryption keys
Gemini Enterprise EnterpriseData at restNoCustomer-managed encryption keys
Google Cloud Managed LustreData at restYesUse customer-managed encryption keys (CMEK)
Google Cloud Managed Service for Apache KafkaData associated with topicsYesConfigure message encryption
Google Cloud NetApp VolumesData at restYesCreate a CMEK policy
Google Distributed CloudData on Edge nodesYesLocal storage security
Google Kubernetes EngineData on VM disksYesUsing customer-managed encryption keys (CMEK)
Google Kubernetes EngineApplication-layer secretsYesApplication-layer Secrets encryption
Integration ConnectorsData at restYesEncryption methods
Looker (Google Cloud core)Data at restYesEnable CMEK for Looker (Google Cloud core)
Memorystore for RedisData at restYesCustomer-managed encryption keys (CMEK)
Memorystore for Redis ClusterData at restYesUse customer-managed encryption keys (CMEK)
Memorystore for ValkeyData at restYesUse customer-managed encryption keys (CMEK)
Migrate to Virtual MachinesData migrated from VMware, AWS, and Azure VM sourcesYesUse CMEK to encrypt data stored during a migration
Migrate to Virtual MachinesData migrated from disk and machine image sourcesYesUse CMEK to encrypt data on target disks and machine images
Parameter ManagerParameter version payloadsYesEnable customer-managed encryption keys for Parameter Manager
Pub/SubData associated with topicsYesConfiguring message encryption
Secret ManagerSecret payloadsYesEnable Customer-Managed Encryption Keys for Secret Manager
Secure Source ManagerInstancesYesEncrypt data with customer-managed encryption keys
Security Command CenterData at restYesEnable CMEK for Security Command Center
SpannerData at restYesCustomer-managed encryption keys (CMEK)
Speaker ID (Restricted GA)Data at restYesUsing customer-managed encryption keys
Speech-to-TextData at restYesUsing customer-managed encryption keys
Vertex AIData associated with resourcesYesUsing customer-managed encryption keys
Vertex AI SearchData at restNoCustomer-managed encryption keys
Vertex AI Workbench managed notebooks (Deprecated)User data at restNoCustomer-managed encryption keys
Vertex AI Workbench user-managed notebooks (Deprecated)Data on VM disksNoCustomer-managed encryption keys
Vertex AI Workbench instancesData on VM disksYesCustomer-managed encryption keys
WorkflowsData at restYesUse customer-managed encryption keys (CMEK)
Workload ManagerCustom rule type evaluation dataYesEnable customer-managed encryption keys for evaluations

CMEK-compliant services

The following table lists services that do not use customer-managed encryptionkeys (CMEKs) because they do not store data long term. For more information onwhy these services are considered CMEK compliant, seeCMEK compliance.

Other integrations with Cloud KMS

These pages discuss other ways to use Cloud KMS with otherGoogle Cloud services.

ProductTopic
Any serviceEncrypt application data before transmitting or storing it
Cloud BuildEncrypt resources before adding them to a build
Sensitive Data ProtectionCreate a wrapped key

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.