Vault
Credential Vault Security Overview
CloudCruise’s credential vault adopts the envelope‑encryption pattern recommended by NIST SP 800‑57 and mirrors proven designs used by services like AWS Secrets Manager and Google Secret Manager. Plaintext credentials are never persisted or transmitted to our servers. This page outlines the key design choices behind that guarantee.
Key hierarchy
- Per‑user data key (AES‑256‑GCM) – generated the first time a user stores a secret.
- Stored only in encrypted form.
- Can be rotated at any time from the dashboard.
- Vault master key – a 256‑bit key held in AWS KMS/HSM.
- Used solely to encrypt/decrypt each user’s data key.
- Stored as a Kubernetes Secret
Secret ingestion flow
- Client encrypts the credential locally with their data key (see Recommended client encryption below).
- The ciphertext is sent to the vault. The vault verifies the envelope and stores it verbatim.
- The vault keeps a mapping:
user‑id → { encrypted_data_key, ciphertext, metadata }
.
The vault rejects any credential that is not already encrypted with the correct data key for that user.
Runtime access
When a browser agent needs a credential:
- The agent requests the ciphertext.
- The vault decrypts the data key entirely in‑memory using the master key mounted from the Kubernetes Secret.
- The agent decrypts the credential in memory, uses it, and immediately zeroises the buffer.
- No decrypted value is logged, cached, or exported.
Key rotation
Users may rotate their data key at any time. The vault automatically:
- Generates a new data key.
- Decrypts each stored secret with the old key within a secure enclave.
- Re‑encrypts the secret with the new key and updates metadata.
- Shreds the old key material.
Recommended client encryption
We use AES‑256‑GCM because it provides confidentiality, integrity, and built‑in authentication (via the tag
) without requiring a separate MAC.
Threat model & mitigations
Threat | Mitigation |
---|---|
Database breach | Secrets remain encrypted with per‑user keys; attacker lacks the data keys. |
Compromise of a single data key | Blast radius limited to that user only. |
Master key exposure | Master key stored in KMS with hardware isolation & strict IAM; usage logged and alerted. |
Replay/tampering | AES‑GCM tag validation prevents bit‑flips or stale ciphertext from being accepted. |
For security questions or key‑rotation assistance, email founders@cloudcruise.com.