How to obtain your own encryption keys

Lucid Key Management Service (KMS) gives you the ability to manage the encryption keys that protect your data, adding a powerful layer of security and control.

Introduction to Key Management Service (KMS)

As part of Enterprise Shield, customers can enable Lucid Key Management Service (KMS) to obtain their own encryption keys for an additional layer of security that does not impact the user experience.

We strongly recommend enabling KMS on your account to strengthen your security posture. To get started, please contact Lucid support.

How it works

Lucid KMS uses envelope encryption. First, your data is encrypted with a Data Encryption Key (DEK), which is then encrypted with your own Key Encryption Key (KEK), securely managed in AWS KMS. Lucid employees never have access to your KEK or your decrypted DEK.

To learn more about this service, see the KMS whitepaper.

Note: These guides are here to help you get the most out of Enterprise Shield, but are not intended to address all scenarios or compliance requirements. You’re in the best position to decide how to configure your settings to ensure they meet your specific security and privacy needs.

Additional guides

Getting started

If you’ve just purchased Enterprise Shield, learn some essential first steps to protecting your account.

Learn more

How to protect against data exfiltration

Protect sensitive documents from being accessed, copied, or shared without authorization.

How to control and monitor document access

Manage inbound and outbound sharing with external users.

How to bolster regulatory compliance

Find and access all documents on your account, and preserve key documents relevant to litigation.

How to automate document management and security

Build custom scripts to change document permissions in bulk, archive documents, or generate custom reports.

How to manage session duration and control access

Balance security through session time-outs and an IP allow list.

How to monitor, investigate, and respond to incidents

Take advantage of audit logs and revision history to reconstruct a timeline of events for incident management.

Collaborate more securely with Enterprise Shield

Contact sales

Get Started

  • Enterprise
  • Contact Sales
  • Pricing
PrivacyLegalCookie privacy choicesCookie policy
  • LinkedIn
  • Twitter
  • Instagram
  • Facebook
  • YouTube
  • Glassdoor
  • TikTok

© 2026 Lucid Software Inc.