Cloak KMS

HSM-backed key management and cryptographic operations for modern software, enterprises, and AI agents.

Use Cloak to generate, protect, and operate keys behind managed HSM infrastructure without building and maintaining your own HSM fleet. Run signing, verification, encryption, decryption, ECDH, public-key retrieval, audit logging, and policy enforcement from one secure platform.


Explore Cloak KMS Open Console

Built for cloud services and local hardware-backed trust

  • HSM-backed key generation and cryptographic operations
  • Tenant-aware authorization, audit trails, and policy controls
  • MCP support for AI agents that need secure signing workflows
  • Scoped agent credentials with expiry, rotation, revocation, and tracking
  • Optional local smartcard and PKCS#11-backed flows through kms-ws-agent

Developers and SaaS Teams

Ship secure key operations without owning HSM infrastructure

Call KMS APIs for signing, verification, encryption, decryption, and ECDH while keeping sensitive keys inside a managed HSM-backed platform.


View Plans

Security and Enterprise Teams

Centralize control, isolation, and auditability

Enforce tenant boundaries, review cryptographic activity, manage master key workflows, and support both human users and automated agents from one control plane.


Talk to Sales

Platform

A KMS control plane with real HSM-backed cryptography behind it

Cloak KMS is designed for teams that need stronger key protection than software-only secrets storage, but do not want the cost and operational burden of deploying traditional HSM infrastructure on their own.

Core Operations

Generate keys, sign, verify, encrypt, decrypt, derive via ECDH, and retrieve public keys through one API surface.


Read more

Security Controls

Use tenant-aware authorization, policy enforcement, audit logging, and managed master key lifecycle workflows to reduce operational risk.


Read more

Agent Access

Issue scoped credentials to developers and AI agents, expose approved tools through MCP, and inspect usage from the console.


Read more

Hybrid Hardware Flows

Connect local smartcard and PKCS#11-backed hardware using kms-ws-agent while keeping orchestration and policy central in the cloud.


Read more

Developer Workflow

Use the console, safe Try It tooling, and straightforward REST patterns to move from evaluation to production faster.


Open console

Product Family

Cloak KMS can back broader document security, signing, and secure sharing workflows across the rest of the Cloak platform.


See related products

Secure KMS access for AI agents

A serious control surface, not a gimmick

Cloak KMS supports the same strong cryptographic platform for human users, applications, and AI agents. Instead of embedding raw secrets into automation, teams can grant scoped credentials and allow approved operations such as listing keys, reading public keys, signing, and verification.

MCP support, Agent Access controls, and usage tracking let you expose cryptographic capabilities to agentic systems without giving away unrestricted access to private key material.

Scoped Credentials

Rotate, revoke, expire, and review agent credentials with tenant-aware controls.

MCP Tools

Expose safe tools for list keys, public-key retrieval, sign, and verify workflows.

Try It Console

Test operations in a controlled environment before wiring them into production systems.

Policy and Logs

Keep cloud orchestration central while preserving auditability across human and agent activity.

Who Cloak KMS is for


SaaS and platform teams

Protect signing keys, service encryption keys, and identity workflows with HSM-backed operations while keeping product teams focused on shipping software instead of operating hardware.

Security and compliance teams

Centralize control over key usage, isolate tenants, review audit logs, and apply policy controls for sensitive workloads that cannot rely on ordinary secrets management alone.


Pro users with local hardware

Connect a local smartcard HSM through kms-ws-agent and let the Cloak control plane coordinate approvals, policy, and cryptographic workflows without forcing hardware into the cloud.

AI-enabled workflows

Give AI agents controlled access to approved key operations for signing, verification, and public-key workflows while preserving separation of duties and visibility over every action.

Cloak builds security software for organizations that need stronger control over cryptographic keys, sensitive files, and signing workflows. Our work has been tested in demanding environments across government, regulated industries, and enterprise software deployments.




award award award award award



Trusted across the USA, South America, Europe, the Middle East, and Asia.



Talk to us about your KMS deployment

For product, pricing, and architecture discussions

Use Cloak KMS if you need stronger cryptographic key protection, better operational control, or a credible way to extend signing and verification workflows to applications and AI agents.

We can help with managed HSM-backed keys, local smartcard-backed integrations, enterprise policy controls, or rollout planning for developer and security teams.


Marcus Tan

Founder

  • Paya Lebar Square #06-28 Singapore 409051
  • sales@cloakapps.com
  • +65 9656 2333