CipherStash Docs

Supported solutions

Integration options, supported databases, and performance characteristics for CipherStash encryption

Supported solutions

CipherStash offers multiple integration paths designed for developer productivity and production readiness.

Integration options

Encryption SDK

Best for: Teams who want fine-grained control over data encryption directly in their application.

The @cipherstash/stack SDK provides application-layer encryption with full TypeScript support, schema-based configuration, and searchable encryption capabilities.

CipherStash Proxy

Best for: DevOps teams who want to add encryption to existing PostgreSQL applications with little to no code changes.

A drop-in SQL proxy for PostgreSQL that automatically handles encryption and decryption operations.

Supported databases

Database compatibility

DatabaseStandard encryptionSearchable encryption
PostgreSQL 15+YesYes
AWS RDS PostgreSQLYesYes
AWS Aurora PostgreSQLYesYes
GCP Cloud SQL for PostgreSQLYesYes
Azure Database for PostgreSQLYesYes
OCI Database Service for PostgreSQLYesYes
DynamoDBYesYes
SupabaseYesComing soon
Neon PostgresYes
MySQLYes
CockroachDBYes

Standard encryption works with any database that supports JSON or JSONB column types. Encrypted values are stored as JSON objects (CipherCells).

Searchable encryption requires EQL (for PostgreSQL) or native integration (for DynamoDB). Searchable encryption enables equality lookups, range queries, ordering, and free-text search on encrypted data without decryption.

Performance characteristics

SDK integration

  • Latency: Less than 5ms overhead for most operations
  • Throughput: Scales with your application
  • Setup time: Running in local dev in under 1 hour, production in under 3 days

Proxy integration

  • Latency: Less than 5ms overhead for most operations
  • Throughput: Horizontally scalable based on database throughput
  • Setup time: Operational in hours with existing PostgreSQL

Getting started

  1. Choose your integration path based on your application type and requirements
  2. Review the getting started guide for your selected solution — Encryption SDK or Proxy
  3. Set up your development environment with the appropriate SDK or proxy
  4. Provision credentials in the CipherStash Dashboard
  5. Deploy to production with confidence in your security posture

On this page