Disaster recovery
How ZeroKMS protects your encrypted data with robust disaster recovery capabilities
Disaster recovery
ZeroKMS is designed to protect your encrypted data with robust disaster recovery capabilities. Your encrypted data remains recoverable even in the event of a complete service disruption.
Separation of keys and data
ZeroKMS uses a fundamental architectural principle: your encrypted data stays in your database. We only manage the key material needed to decrypt that data. This separation means:
- Your encrypted data is never stored in CipherStash infrastructure
- A CipherStash outage affects key access, not your data
- Recovery doesn't require migrating or restoring potentially terabytes of encrypted data
Key recovery process
ZeroKMS uses a hierarchical key structure that enables you to regenerate data keys on-demand without storing every individual key. This means:
- Key material is cryptographically reproducible
- No database of individual data keys needs to be restored
- Recovery time is measured in hours, not days
Zero data loss
In a disaster recovery scenario, no data loss occurs. All encrypted data remains intact and fully recoverable. The key material used to generate your data keys is preserved and can be regenerated.
Fast recovery in case of regional failure
In the event of a complete regional failure, CipherStash can restore ZeroKMS service within a few hours. During this time:
- Your encrypted data remains safely stored in your database
- Applications cannot decrypt existing data or encrypt new data
- Once service is restored, all operations resume normally
What happens during a ZeroKMS outage?
Data access during an outage
During a CipherStash outage, can we access our encrypted data?
No. While ZeroKMS is unavailable, your applications cannot perform cryptographic operations (encrypt or decrypt). This is an intentional security design — cryptographic operations require active key management infrastructure.
Is our encrypted data at risk?
No. Your encrypted data remains safely stored in your own database. A CipherStash outage does not expose, corrupt, or delete your data.
After recovery
Once service is restored to a new region or infrastructure:
- Your applications reconnect to the restored ZeroKMS endpoint
- Key material is cryptographically regenerated
- All encrypted data becomes accessible again
- No data migration or reindexing is required
Architecture benefits
Compared to traditional approaches
Many encryption and data protection solutions require storing both encrypted data and keys together in a "vault." During disaster recovery, these solutions must restore the entire vault — potentially terabytes of data, taking hours or days.
ZeroKMS is different:
- Only lightweight key material (megabytes) needs to be restored
- Your encrypted data never moves — it stays in your database
- Recovery is based on cryptographic regeneration, not data restoration
Security during recovery
- Encrypted data in your database remains protected
- Key material is restored through cryptographically secure processes
- Access controls and audit logging resume immediately when service is restored
- No temporary "recovery windows" that might expose data
Questions?
If you have specific disaster recovery requirements or need to discuss your resilience planning, please contact support@cipherstash.com.