Platform
Introduction
The CipherStash platform consists of three core components that work together to provide continuous security for your applications and data.
Core Components
Workspaces
What: Isolated environments for your applications and configurations Contains: Regional deployments, access keys, OIDC providers Purpose: Environment isolation and configuration management
ZeroKMS
What: Zero-trust key management service Contains: Client keys, key sets, cryptographic operations Purpose: Secure key generation and management without key exposure
Organizations
What: Multi-tenant management layer Contains: Members, billing, cross-workspace policies Purpose: Centralized governance and access control
Integration Paths
For Applications
- Protect SDKs: Direct integration using workspace configuration
- Proxy: Transparent database encryption using platform authentication
For Infrastructure
- Managed: Use CipherStash Cloud with automatic scaling
- Self-hosted: Deploy ZeroKMS in your own AWS environment (only available for Enterprise customers)
Quick Start
Create an account and generate your credentials and keys in the Dashboard.
More information
- Dashboard - Set up your environment
- Read about ZeroKMS - Configure key management
- Organization Management - Manage access and billing