Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Terraform in Yandex Cloud
  • Getting started
  • Solution library
    • Overview
    • Release notes
          • kms_asymmetric_encryption_key
          • kms_asymmetric_encryption_key_iam_binding
          • kms_asymmetric_encryption_key_iam_member
          • kms_asymmetric_signature_key
          • kms_asymmetric_signature_key_iam_binding
          • kms_asymmetric_signature_key_iam_member
          • kms_secret_ciphertext
          • kms_symmetric_key
          • kms_symmetric_key_iam_binding
          • kms_symmetric_key_iam_member

In this article:

  • Example usage
  • Arguments & Attributes Reference
  1. Terraform reference
  2. Resources
  3. Key Management Service
  4. Resources
  5. kms_secret_ciphertext

yandex_kms_secret_ciphertext (Resource)

Written by
Yandex Cloud
Updated at February 9, 2026
  • Example usage
  • Arguments & Attributes Reference

Encrypts given plaintext with the specified Yandex KMS key and provides access to the CipherText.

Warning

Using this resource will allow you to conceal secret data within your resource definitions, but it does not take care of protecting that data in the logging output, plan output, or state output. Please take care to secure your secret data outside of resource definitions.

For more information, see the official documentation.

Example usageExample usage

//
// Create a new KMS Symmetric Encryption Key and Cipher Secret for it.
//
resource "yandex_kms_symmetric_key" "example" {
  name        = "example-symetric-key"
  description = "description for key"
}

resource "yandex_kms_secret_ciphertext" "password" {
  key_id      = yandex_kms_symmetric_key.example.id
  aad_context = "additional authenticated data"
  plaintext   = "strong password"
}

Arguments & Attributes ReferenceArguments & Attributes Reference

  • aad_context (String). Additional authenticated data (AAD context), optional. If specified, this data will be required for decryption with the SymmetricDecryptRequest.
  • ciphertext (Read-Only) (String). Resulting CipherText, encoded with standard base64 alphabet as defined in RFC 4648 section 4.
  • id (String).
  • key_id (Required)(String). ID of the symmetric KMS key to use for encryption.
  • plaintext (Required)(String). Plaintext to be encrypted.

Was the article helpful?

Previous
kms_asymmetric_signature_key_iam_member
Next
kms_symmetric_key
© 2026 Direct Cursus Technology L.L.C.