Process Flow - KMS for key management
Create KMS Key
Define Key Policy
Use Key to Encrypt Data
Store Encrypted Data
Request Decrypt with Key
KMS Checks Permissions
Decrypt Data
Return Plain Data
This flow shows how a KMS key is created, used to encrypt data, and then used to decrypt data with permission checks.