Features
The Encryption Proxy is a modular system that enables transparent encryption and decryption across application and database layers. Below is a list of supported and upcoming components:
HTTP API
Encryption Services
✅ Ready
PostgreSQL
Database Proxy
✅ Ready
MySQL
Database Proxy
🚧 Next Release
MongoDB
Database Proxy
🚧 Next Release
Component Details
HTTP API (Encryption Services) A stateless REST API that provides encryption and decryption endpoints. It supports envelope encryption, key rotation, and integration with external Key Management Systems (KMS).
PostgreSQL Database Proxy Acts as a transparent proxy layer for PostgreSQL, intercepting SQL queries and responses to perform field-level encryption/decryption without modifying client applications.
MySQL Database Proxy (Planned) Upcoming support for MySQL with similar capabilities as the PostgreSQL proxy, including real-time encryption and query rewriting.
MongoDB Database Proxy (Planned) Proxy support for MongoDB to handle BSON-level encryption and support schema-aware field-level encryption.
Key Features
Database Compatibility
Currently supports PostgreSQL with plans to expand to other databases like MySQL, MongoDB, and more.
Provides a unified security layer for diverse database environments.
Flexible Configuration
Easily configurable through YAML files, allowing customization for various use cases.
AES-GCM Encryption with Authentication
Utilizes AES-GCM (Authenticated Encryption with Associated Data - AEAD) for encrypting data at rest.
Provides both encryption and authentication, ensuring data integrity and confidentiality.
Column-Level Encryption
Encrypts sensitive data at the column level with minimal affecting database structure.
Ensures minimal application performance impact.
Key Management Integration
Currently supports ENV based and Google Cloud KMS with plans to expand to AWS KMS and in-house key management services.
Ensures vendor-agnostic key storage and management.
Supports key rotation, allowing periodic changes to encryption keys without disrupting database operations.
Zero Trust Security Model
Enforces least privilege access by ensuring encryption keys and data access are restricted based on identity and role-based controls.
Continuous verification of encryption processes to prevent breaches and ensure real-time compliance monitoring.
Audit Logs & Monitoring
Records all encryption and decryption activities for traceability and compliance.
Provides detailed audit logs that help organizations track data access and modifications.
Ensures transparency and accountability by maintaining immutable logs of cryptographic operations.
Compliance & Security
Meets industry standards for encryption and data protection.
Helps organizations comply with data privacy regulations.
Performance Optimization
Designed to handle high-performance workloads.
Last updated