Security Architecture

Zero-knowledge confidentiality with blockchain-verifiable audit integrity

How It Works

Eight-layer security architecture protecting your secrets at every step

Client App
TLS Encryption
API Gateway
Authentication
RBAC Policy
Audit Log
Secret Retrieval
Encrypted Response

Every secret is encrypted end-to-end using AES-256-GCM, and decryption keys remain under user control. Audit events are anchored for blockchain-backed integrity checks.

How Your Data Stays Secure

Your secrets are encrypted on your device before transmission, while critical governance events are integrity-anchored for independent verification.

🖥️

YOUR DEVICE

•••••••••••• Master Password
LOCAL ENCRYPTION AES-256-GCM
KEY DERIVATION PBKDF2 + Salt
STEP 1 Encrypt locally
ENCRYPTED
- - - - ▶
Only ciphertext
leaves device

SECURE TRANSIT

TLS 1.3 End-to-End Encrypted
SSL Certificate 256-bit encryption
STEP 2 Secure transmission
ENCRYPTED
- - - - ▶
Still encrypted
☁️

PRODEGYVAULT SERVER

WHAT WE STORE

  • Encrypted blob (ciphertext)
  • Your email (for login)
  • Encrypted metadata
  • Audit logs

WHAT WE NEVER STORE

  • Your master password
  • Decryption keys
  • Plaintext secrets
STEP 3 Store encrypted only
Your password never leaves your device in readable form, and your critical audit events remain verifiable

What's Stored Where

Complete transparency about what data lives where. Your encryption keys never leave your device.

💻

Your Local Device

  • Session encryption key (temporary)
  • Decrypted secrets (in memory only)
  • Local cache (encrypted)
  • Your preferences
Cleared when you log out - Nothing persists without your password
Encrypted Channel
☁️

ProdegyVault Servers

  • Encrypted vault blob
  • Account email
  • Password hash (for auth only)
  • Audit metadata and integrity proofs
  • Master password - NEVER
  • Encryption keys - NEVER
  • Plaintext data - NEVER

Security Guarantees

Controls designed for confidentiality, governance, and defensible compliance

🔒

Zero-Knowledge

We cannot decrypt your secrets. Your encryption keys are generated and stored on your infrastructure, not ours.

🔐

End-to-End Encryption

All secrets encrypted with AES-256-GCM before transmission. Encrypted at rest, encrypted in transit, encrypted in use.

📋

Blockchain-Verifiable Audit Logs

Every access to every secret is logged with tamper-evident records and blockchain anchoring for integrity validation.

🏢

Data Residency

Choose where your secrets live: India, UK, EU, or US. No cross-border transfers without your consent.

👥

Role-Based Access Control

Fine-grained RBAC with approval workflows. Users only access the secrets they need, when they need them.

🔄

Automatic Rotation

Schedule automatic secret rotation to minimize exposure window. Never manually manage sensitive credentials again.

Retention Policies

Define how long secrets and audit logs are retained. Automatic deletion ensures compliance with data regulations.

🚨

Break-glass Access

Emergency access mechanism with approval workflows and complete audit trail. For critical incidents only.

🔒

Zero-Knowledge

We cannot decrypt your secrets. Your encryption keys are generated and stored on your infrastructure, not ours.

🔐

End-to-End Encryption

All secrets encrypted with AES-256-GCM before transmission. Encrypted at rest, encrypted in transit, encrypted in use.

📋

Blockchain-Verifiable Audit Logs

Every access to every secret is logged with tamper-evident records and blockchain anchoring for integrity validation.

🏢

Data Residency

Choose where your secrets live: India, UK, EU, or US. No cross-border transfers without your consent.

👥

Role-Based Access Control

Fine-grained RBAC with approval workflows. Users only access the secrets they need, when they need them.

🔄

Automatic Rotation

Schedule automatic secret rotation to minimize exposure window. Never manually manage sensitive credentials again.

Retention Policies

Define how long secrets and audit logs are retained. Automatic deletion ensures compliance with data regulations.

🚨

Break-glass Access

Emergency access mechanism with approval workflows and complete audit trail. For critical incidents only.

Technical Implementation

  • AES-256-GCM encryption standard
  • PBKDF2 key derivation with 100k iterations
  • TLS 1.3 for all transport
  • SHA-256 for integrity verification
  • 256-bit random nonces for each encryption
  • Hardware security module (HSM) support
  • Regular penetration testing
  • SOC 2 Type II readiness controls

Compliance Readiness

  • SOC 2 Type II aligned control framework
  • ISO 27001 aligned control framework
  • HIPAA aligned architecture
  • GDPR ready controls built-in
  • DPDPA ready (India data residency)
  • UK GDPR compatible
  • PCI DSS support (roadmap)
  • CCPA compliant features

Security Glossary & Common Terms

Understanding enterprise security architecture

Zero-Knowledge Architecture

A design pattern where the service provider cannot decrypt or view user data. Users control encryption keys, and the server only manages encrypted data. Even with full system access, Prodegy staff cannot access your secrets.

End-to-End Encryption (E2E)

Encryption applied at the source (client) and decrypted only at the destination (authorized user). Data is never unencrypted on intermediate servers. In Prodegy Vault, all secrets are encrypted before leaving your infrastructure.

AES-256-GCM

Advanced Encryption Standard with 256-bit keys and Galois/Counter Mode. Industry standard for high-security applications. Provides both confidentiality (encryption) and authenticity (verification) in a single operation.

Blockchain-Verifiable Audit Logs

Logs that cannot be modified or deleted after creation, even by administrators. Provides complete accountability and helps with compliance requirements. Every access to every secret is permanently recorded.

TLS 1.3

Transport Layer Security version 1.3. Latest encryption standard for data in transit. Provides confidentiality, integrity, and authentication for all network communications between clients and servers.

PBKDF2 Key Derivation

Password-Based Key Derivation Function 2. Converts user passwords into cryptographically strong keys. Uses iterative hashing (100,000 iterations) to make brute-force attacks computationally expensive.

Hardware Security Module (HSM)

A physical device that manages encryption keys and performs cryptographic operations. Keys never leave the HSM. Provides tamper-evident protection for your most sensitive encryption keys.

Data Residency

The legal requirement that data must be stored in specific geographical locations. GDPR requires EU data to stay in EU, DPDPA requires certain India data to stay in India. Prodegy Vault allows you to choose your storage region.

SOC 2 Type II Certification

A security audit standard that evaluates trust in service organizations. Type II includes testing of security controls over a minimum of 6 months. Demonstrates that Prodegy Vault maintains security controls consistently over time.