• My company has created an in-house application that we use to manage passwords, keys and access to them.

    all data is stored in SQL tables and is encrypted by the application.

    The application records all actions taken including creation, deletion, editing, access, granting access, etc to an encrypted table in the database so it cannot be changed outside the application.

    This is working very well for us.