Introduction
CipherStash Documentation
With CipherStash you will be able to encrypt each individual record in your database with a unique data key. The ciphertext is searchable, allowing you to query your encrypted data without decrypting it or sacrificing performance. This is called encryption-in-use.
All decryptions are authorized and logged, giving you a cryptographically-proven audit trail of all access to sensitive data.
Overview
Most useful articles to get you familiar with our concepts and how to begin protecting your data.
Getting started
Step-by-step guide to setting up your system and running the example app.
Searchable encryption
Learn how we achieve encryption-in-use with the Tandem product.
Key management
Learn about our Zero Trust key management product, ZeroKMS.
CLI
Install the CipherStash CLI to manage your workspaces.
Getting help
Having trouble? We want to help you:
- Looking for specific information? Try the FAQ.
- Can’t find what you’re looking for? Ask us a question.
- Want to chat? Book a technical demo.