You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/concepts/WHY.md
+16-23Lines changed: 16 additions & 23 deletions
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,13 @@
1
1
# Postgres data security with CipherStash
2
2
3
-
This article gives a high-level overview of CipherStash's encryption in use solution, including the CipherStash Proxy and the Encrypt Query Language (EQL).
3
+
This page gives a high-level overview of CipherStash's encryption in use solution, including CipherStash Proxy and the Encrypt Query Language (EQL). It's designed for developers and engineers who need to implement robust data security in PostgreSQL without sacrificing performance or usability.
4
4
5
-
It is designed for developers and engineers who need to implement robust data security in PostgreSQL without sacrificing performance or usability.
6
-
7
-
## Table of Contents
5
+
## On this page
8
6
9
7
1.[Encryption in use](#encryption-in-use)
10
8
-[What is encryption in use?](#what-is-encryption-in-use)
11
9
-[Why use encryption in use?](#why-use-encryption-in-use)
12
10
2.[CipherStash Proxy](#cipherstash-proxy)
13
-
-[Proxy overview](#proxy-overview)
14
11
-[How it works](#how-it-works)
15
12
3.[Encrypt Query Language (EQL)](#encrypt-query-language-eql)
16
13
4.[Best practices](#best-practices)
@@ -20,7 +17,8 @@ It is designed for developers and engineers who need to implement robust data se
20
17
21
18
## Encryption in use
22
19
23
-
EQL enables encryption in use, without significant changes to your application code.
20
+
CipherStash's encryption in use solution, comprising CipherStash Proxy and EQL, provides a practical way to enhance data security in Postgres databases.
21
+
EQL enables encryption in use without significant changes to your application code.
24
22
A variety of searchable encryption techniques are available, including:
25
23
26
24
-**Matching** - Equality or partial matches
@@ -44,8 +42,6 @@ Encryption in use mitigates this risk by ensuring that:
44
42
45
43
## CipherStash Proxy
46
44
47
-
### Proxy overview
48
-
49
45
CipherStash Proxy is a transparent proxy that sits between your application and your PostgreSQL database.
50
46
It intercepts SQL queries and handles the encryption and decryption of data on-the-fly.
51
47
This enables encryption in use without significant changes to your application code.
@@ -63,19 +59,19 @@ This enables encryption in use without significant changes to your application c
63
59
Encrypt Query Language (EQL) is a set of PostgreSQL functions and data types provided by CipherStash to work with encrypted data and indexes.
64
60
EQL allows you to perform queries on encrypted data without decrypting it, supporting operations like equality checks, range queries, and unique constraints.
65
61
66
-
To get started, view the [Getting Started](https://github.com/cipherstash/encrypt-query-language/blob/main/GETTINGSTARTED.md) guide.
62
+
To get started, read the [Getting started](https://github.com/cipherstash/encrypt-query-language/blob/main/GETTINGSTARTED.md) guide.
67
63
68
-
## Best Practices
64
+
## Best practices
69
65
70
-
-**Leverage CipherStash Proxy**: Use CipherStash Proxy to handle encryption/decryption transparently.
71
-
-**Utilize EQL functions**: Always use EQL functions when interacting with encrypted data.
72
-
-**Define constraints**: Apply database constraintsto maintain data integrity.
73
-
-**Secure key management**: Ensure encryption keys are securely managed and stored.
74
-
-**Monitor performance**: Keep an eye on query performance and optimize as needed.
66
+
-**Use CipherStash Proxy** to handle encryption/decryption transparently.
67
+
-**Use EQL functions** when interacting with encrypted data.
68
+
-**Define database constraints**to maintain data integrity.
69
+
-**Secure key management** of encryption keys.
70
+
-**Monitor query performance** and optimize as needed.
75
71
76
-
## Advanced Topics
72
+
## Advanced topics
77
73
78
-
### Integrating without CipehrStash Proxy
74
+
### Integrating without CipherStash Proxy
79
75
80
76
> The SDK approach is currently in development, but if you're interested in contributing, please start a discussion [here](https://github.com/cipherstash/encrypt-query-language/discussions).
81
77
@@ -88,11 +84,8 @@ For advanced users who prefer to handle encryption within their application:
88
84
89
85
**Note**: This approach increases complexity and is recommended only if CipherStash Proxy does not meet specific requirements.
90
86
91
-
## Conclusion
92
-
93
-
CipherStash's encryption in use solution, comprising CipherStash Proxy and EQL, provides a practical way to enhance data security in Postgres databases.
94
-
By keeping data encrypted even during processing, you minimize the risk of data breaches and comply with stringent security standards without significant changes to your application logic.
87
+
## Getting started
95
88
96
-
To get started, see the [Getting Started](https://github.com/cipherstash/encrypt-query-language/blob/main/GETTINGSTARTED.md) guide.
89
+
To get started using CipherStash's encryption is use solution, see the [Getting Started](https://github.com/cipherstash/encrypt-query-language/blob/main/GETTINGSTARTED.md) guide.
97
90
98
-
**Contact Support:**For further assistance, raise an issue [here](https://github.com/cipherstash/encrypt-query-language/issues).
91
+
For further help, raise an issue [here](https://github.com/cipherstash/encrypt-query-language/issues).
0 commit comments