Generic templated configuration management for Kubernetes, Terraform and other things
-
Updated
Apr 24, 2026 - Python
Generic templated configuration management for Kubernetes, Terraform and other things
Python implementation of Tink
Tezos remote signer with policies, Prometheus metrics, and HSM/KMS + TEE backends (YubiHSM, CloudHSM, Nitro Enclaves, Confidential Space).
Extension to Tink Go that provides Google Cloud KMS integration
Cloud HSM to sign Web3.py Ethereum transactions
Google Cloud KMS extension for Tink C++
AWS/GCP KMS-based Ethereum signer for viem with enterprise-grade security. Sign transactions and messages using keys stored in AWS or GCP KMS without exposing private keys.
Extension to Tink Java that provides Google Cloud KMS integration
golang-jwt for post quantum cryptography
This terraform module is used to create a KMS Customer Master Key (CMK).
Thistle Release Helper with KMS Signing
This project demonstrates how to ensure data security and compliance with industry regulations. This includes the use of GCP IAM for access control, GCP KMS for data encryption, GCP SCC for sensitive data discovery and classification, and GCP Audit Logs for logging and auditing.
Encrypted local environment variable storage
Universal key resolution — one API, every key store
Key provider for Cyphera — resolve keys from AWS KMS, GCP, Azure Key Vault, HashiCorp Vault, and more.
Add a description, image, and links to the gcp-kms topic page so that developers can more easily learn about it.
To associate your repository with the gcp-kms topic, visit your repo's landing page and select "manage topics."