Secret Manager overview

Secret Manager is a secrets and credential management servicethat lets you store and manage sensitive data such as API keys, usernames, passwords,certificates, and more.

Asecretis a global resource that contains a collection of metadata and secret versions. The metadata can includelabels, annotations, and permissions.

Asecret versionstores the actual secret data, such as API keys, passwords, or certificates. Each version isidentified by a unique ID or timestamp.

Using Secret Manager, you can do the following:

  • Manage rollback, recovery, and auditing using versions: Versions help you manage gradual rollouts and emergency rollback, If a secret is accidentally changed or compromised, you can revert to a previous, known-good version. This minimizes potential downtime and security breaches. Versioning maintains a historical record of changes made to a secret, including who made the changes and when. It helps you audit secret data and track any unauthorized access attempts. You can pin secret versions to specific workloads and addaliases for easier access to secret data. You can alsodisable ordestroy secret versions that you don't require.

  • Encrypt your secret data in transit and at rest: All secrets are encrypted by default, both in transit using TLS and at rest with AES-256-bit encryption keys. For those requiring more granular control, you can encrypt your secret data withCustomer-Managed Encryption Keys (CMEK). Using CMEK, you can generate new encryption keys or import existing ones to meet your specific requirements.

  • Manage access to secrets using fine-grained Identity and Access Management (IAM) roles and conditions: WithIAM roles and permissions, you canprovide granular access to specific Secret Manager resources. You can segregate responsibilities for accessing, managing, auditing, and rotating secrets.

  • Ensure high availability and disaster recovery with secret replication: You canreplicate your secrets across multiple regions to ensure high availability and disaster recovery for your applications regardless of their geographic location. You can choose between the following replication policies:

    • Automatic replication: Google Cloud decides the regions considering availability and latency. You are only charged for one location.

    • User managed replication: You can select a custom set of regions depending on your requirements. You are charged per location.

  • Rotate secrets automatically to meet your security and compliance requirements:Rotating your secrets protects against unauthorized access and data breaches. Regularly changing your secrets reduces the risk of stale or forgotten secrets and ensures compliance with many regulatory frameworks that require periodic rotation of sensitive credentials.

  • Enforce data residency using regional secrets:Data residency requires that certain types of data, often belonging to specific individuals or organizations, be stored within a defined geographic location. You can createregional secrets and store your sensitive data within a specific location to comply with data sovereignty laws and regulations.

  • Manage operational parameters for your applications using Parameter Manager:Parameter Manager is an extension to the Secret Manager service that you can use to store and manage application configurations such as database connection strings, feature flags, environment names, port numbers to listen on, and settings for application features. You can alsoreference secrets stored in Secret Manager within your parameter configurations. To use Parameter Manager, you must enable the Parameter Manager API and grant your users therequired IAM roles.

  • Difference between secrets management and key management

    Secrets management and key management are both critical components of data security,but they serve distinct purposes and handle different types of sensitive information.The choice between secrets management and key management depends on your specific needs.If you want to securely store and manage confidential data, a secrets management systemis the right tool. If you want to manage encryption keys and perform cryptographic operations,a key management system is the better choice.

    You can use the following table to understand the key differences between Secret Managerand a key management system, such asCloud Key Management Service(Cloud KMS).

    FeatureSecret ManagerCloud KMS
    Primary functionStore, manage, and access secrets as binary blobs or text strings.Manage cryptographic keys and use them to encrypt or decrypt data.
    Data storedActual secret values. With the appropriate permissions, you can view the contents of the secret.Cryptographic keys. You can't view, extract, or export the actual cryptographic secrets (the bits and bytes) that are used for encryption and decryption operations.
    EncryptionEncrypts secrets at rest and in transit using Google-owned and managed keys or customer-managed keys.Provides encryption and decryption capabilities for other services.
    Typical use casesStore configuration information such as database passwords, API keys, or TLS certificates needed by an application at runtime.Handle large encryption workloads, such as encrypting rows in a database or encrypting binary data such as images and files. You can also use Cloud KMS to perform other cryptographic operations such as signing and verification.

    Encryption of secrets

    Secret Manager always encrypts your secret data before it is persistedto disk. To learn more about Google Cloud encryption options, refer toEncryption at rest.

    Secret Manager manages server-side encryption keys on your behalf usingthe same hardened key management systems that we use for our own encrypted data,including strict key access controls and auditing. Secret Managerencrypts user data at rest using AES-256. There is no setup orconfiguration required, no need to modify the way you access the service, and novisible performance impact. Your secret data is automatically and transparentlydecrypted when accessed by an authorized user.

    The Secret Manager API always communicates over a secure HTTP(S) connection.

    Those who require an extra layer of protection can enable CMEK and use their ownencryption keys stored in Cloud Key Management Service to protect the secrets stored inSecret Manager. See theCMEK documentationfor details on how to configure and use customer-managed encryption keys.

    What's next

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.