Skip to main content
Cloud / STACKIT / Products / STACKIT Key Management Service - HSM-backed KMS

STACKIT Key Management Service - HSM-backed KMS

STACKIT KMS: HSM-secured encryption keys from Germany. FIPS 140-2 Level 3, automatic rotation, GDPR-compliant.

Security
Pricing Model Per key + operations
Availability Germany (multi-AZ)
Data Sovereignty Keys never leave German HSMs
Reliability 99.99% availability SLA

What is STACKIT Key Management Service?

STACKIT Key Management Service (KMS) is a centralized service for secure creation, storage, and use of cryptographic keys. The service supports HSM-backed keys stored in FIPS 140-2 Level 3 certified Hardware Security Modules that never leave the HSM. As a German cloud provider, STACKIT guarantees that all keys remain exclusively in German data centers.

Core Features

  • HSM Protection: FIPS 140-2 Level 3 certified Hardware Security Modules
  • Envelope Encryption: Data Encryption Keys (DEK) encrypt data, Key Encryption Keys (KEK) protect DEKs
  • Automatic Rotation: Configurable rotation schedules with version management
  • Audit Logging: CloudTrail-like logs for all cryptographic operations
  • Native Integration: Block Storage, Object Storage, and Compute Engine encryption

Typical Use Cases

Database Encryption: PostgreSQL, MySQL, and SQL Server use Transparent Data Encryption (TDE) with KMS-managed master keys. Automatic rotation meets compliance requirements.

Volume Encryption: Encrypt STACKIT Block Storage volumes with Customer Managed Keys. Revoke access in emergencies by deactivating the key.

Digital Signatures: RSA and ECC keys sign software artifacts and container images. Private keys never leave the HSM.

Benefits

  • GDPR-compliant: All keys in German HSMs, no US-CLOUD Act risk
  • FIPS 140-2 Level 3: Highest hardware security certification
  • Compliance-ready: BSI C5, ISO 27001, PCI-DSS compliant key management
  • Audit-capable: Complete logs for all encryption operations

Integration with innFactory

As an official STACKIT partner, innFactory supports you with KMS: envelope encryption architecture, BYOK setup, key rotation policies, and compliance documentation.

Available Tiers & Options

Software Keys

Strengths
  • Lower cost
  • High throughput
Considerations
  • No HSM protection

Typical Use Cases

Database encryption
Volume encryption
Digital signatures
Compliance (BSI, GDPR)

Technical Specifications

Algorithms AES-256-GCM, RSA-2048/4096, ECDSA
Hsm FIPS 140-2 Level 3 certified
Key types AES, RSA, ECC
Rotation Automatic key rotation

Frequently Asked Questions

What is the difference between Software and HSM Keys?

HSM Keys are stored in FIPS 140-2 Level 3 certified hardware modules and never leave the HSM. Software Keys offer higher throughput at lower cost.

Can I import my own keys (BYOK)?

Yes, Bring-Your-Own-Key is supported for importing externally generated keys.

How does automatic key rotation work?

KMS automatically creates new key versions. Old versions remain available for decrypting existing data.

Which algorithms are supported?

AES-256-GCM for symmetric encryption, RSA-2048/4096 and ECDSA for asymmetric cryptography.

Does STACKIT KMS meet FIPS 140-2 Level 3?

Yes, HSM Keys are stored in FIPS 140-2 Level 3 certified Hardware Security Modules.

STACKIT Partner

innFactory is an official STACKIT Partner. We provide consulting, implementation, and managed services for the sovereign cloud.

STACKIT Official Partner

Ready to start with STACKIT Key Management Service - HSM-backed KMS?

Our certified STACKIT experts help you with architecture, integration, and optimization.

Schedule Consultation