- To prevent rainbow table attacks
- To encrypt data at rest
- To rotate encryption keys
- To manage access to encryption keys