- Securely store cryptographic keys in hardware-backed secure enclaves
- Implement disaster recovery with cryptographic guarantees
- Protect sensitive material like API secrets, credentials, and recovery bundles
Secure Enclaves
At the foundation of Key Management is Turnkey’s secure enclave infrastructure. Keys are generated and stored inside hardware-backed enclaves, and key material never exists in plaintext outside the enclave boundary.What can you build?
| Example | Description |
|---|---|
| Enterprise Disaster Recovery | Recover wallets and cryptographic material when incidents occur or credentials are compromised |
| Encryption Key Storage | Use Turnkey as a secure key storage and retrieval service to build user-controlled recovery with risk separation between your infrastructure and Turnkey |