Using encryption keys to secure encryption assets
Every SSH key, private key, and Credential object in the Trust Protection Platform database is secured with an encryption key. In Policy Tree, you can manage which encryption keys are used to secure which types of encryption assets.