AWS KMS Manages Encryption Keys. The Keys Do Not Carry Governance.
by Nick Clark | Published March 27, 2026
AWS Key Management Service provides hardware-backed key management with fine-grained access control through IAM policies. Keys never leave HSM boundaries. Encryption and decryption operations are audited through CloudTrail. The key management is rigorous. But KMS manages keys as cryptographic primitives. The keys themselves carry no governance policy for how the encrypted data should be used by the systems that decrypt it. The gap is between managing keys and governing operations.
AWS KMS is critical infrastructure used by virtually every serious AWS deployment. Its HSM-backed security, integration with every AWS service, and automatic key rotation are genuine strengths. The gap described here is about the scope of governance, not the quality of key management.
IAM controls access to keys, not use of decrypted data
KMS key policies and IAM policies control who can encrypt, decrypt, and manage keys. When a service calls KMS to decrypt data, IAM evaluates whether the caller has permission for the kms:Decrypt action on the specific key. This is access governance at the key operation level.
But once the data is decrypted, KMS has no further role. The decrypted data enters the calling service's memory with no cryptographic constraints on its use. The governance boundary ends at the decrypt call. What happens to the plaintext after that is entirely up to the application.
Key lifecycle is not governance lifecycle
KMS provides key rotation, key deletion scheduling, and key usage auditing. These manage the lifecycle of the cryptographic primitive. But the governance lifecycle of the operations those keys enable, what actions are permitted, what compliance requirements apply, what audit trail is required, exists in separate systems.
What cryptographic governance provides
Cryptographic governance binds policy to operations cryptographically. Every mutation, every data access, every agent action is gated by a signed policy reference. The governance does not live in a separate IAM system that checks permissions at point of access. It is a cryptographic artifact attached to the operation, validated at every step.
In a cryptographically governed system, decrypted data would carry governance constraints that persist through every operation that touches it. An agent accessing sensitive data would be validated not just for decryption permission but for the specific use it intends, against the signed policy bound to the data.
The remaining gap
AWS KMS solved key management. The remaining gap is in governance scope: whether cryptographic policy can govern the entire lifecycle of data and operations rather than ending at the point of key access.