Google Secret Manager API

Google Secret Manager API — store, manage, and access API keys, passwords, and certificates as versioned, encrypted secrets with IAM-controlled access and audit logging.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Security google-cloud gcp secret-manager secrets credentials vault encryption
⚙ Agent Friendliness
64
/ 100
Can an agent use this?
🔒 Security
96
/ 100
Is it safe for agents?
⚡ Reliability
91
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
--
Documentation
90
Error Messages
88
Auth Simplicity
72
Rate Limits
85

🔒 Security

TLS Enforcement
100
Auth Strength
95
Scope Granularity
95
Dep. Hygiene
92
Secret Handling
98

Secrets encrypted at rest with Google-managed or CMEK keys. IAM at individual secret level. Cloud Audit Logs capture every access. Customer-managed encryption keys (CMEK) available. FedRAMP High, HIPAA BAA available.

⚡ Reliability

Uptime/SLA
92
Version Stability
92
Breaking Changes
90
Error Recovery
90
AF Security Reliability

Best When

Your GCP agent services need centralized, audited, versioned secret storage with native Cloud Run/GKE integration.

Avoid When

You're not on GCP or need cross-cloud secret management — use HashiCorp Vault for portability.

Use Cases

  • Agents fetching database credentials, API keys, and certificates at runtime without hardcoding secrets
  • Rotating secrets automatically — agents updating secret versions and accessing latest without downtime
  • Injecting secrets into Cloud Run or GKE workloads via Secret Manager environment variable bindings
  • Auditing secret access — agents reading Cloud Audit Logs to track which services accessed which secrets
  • Cross-project secret sharing — central secret store accessed by multiple agent services across GCP projects

Not For

  • Teams not on GCP — use AWS Secrets Manager, Azure Key Vault, or HashiCorp Vault instead
  • High-frequency secret reads at high volume — cache secrets locally; avoid API call per request
  • Non-secret configuration data — use Cloud Runtime Config or environment variables for non-sensitive config

Interface

REST API
Yes
GraphQL
No
gRPC
Yes
MCP Server
No
SDK
Yes
Webhooks
No

Authentication

Methods: oauth2 service_account
OAuth: Yes Scopes: Yes

Google service account or ADC. secretmanager.versions.access to read secrets; secretmanager.secrets.create to create. Granular IAM at project/secret level — follow least privilege.

Pricing

Model: pay-as-you-go
Free tier: Yes
Requires CC: Yes

Very low cost for typical usage. Replication (regional vs global) affects pricing. Old versions should be destroyed after rotation to minimize version storage costs.

Agent Metadata

Pagination
page_token
Idempotent
Full
Retry Guidance
Documented

Known Gotchas

  • Secret values are returned as bytes — agents must decode from base64 after access (SDK handles this automatically)
  • Secret versions are immutable — you cannot update a version, only add new versions and destroy old ones
  • IAM propagation can take up to 60 seconds after granting access — agents may get PERMISSION_DENIED briefly after role grant
  • Accessing latest version requires 'latest' alias in version name — not the numeric ID (which changes on rotation)
  • Destroyed secret versions cannot be undeleted — implement soft-delete pattern with DISABLED state before destroying

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Google Secret Manager API.

$99

Scores are editorial opinions as of 2026-03-06.

5229
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered