At rest: four independent encryption layers
Each layer uses its own
1) Tenant layer
Each organisation within vauzy has a unique 64 byte encryption key which is sealed by
. It encrypts each vault’s unique 256 bit key usingAWS KMS with uniqueAES-256-GCM /IV and contextualcounter .AAD 2) Vault layer
Every vault has its own
key.AES-256-GCM includes vault and organisation identifiers to detect tampering. This ensures that data from one vault can never decrypt another — even within the same account.AAD 3) Vault - Credential relationship layer
Each unique credential and vault relationship gets a dedicated encryption key, which is encrypted by the parent vault key. Rotate or revoke one item without touching others.
4) Credential Secret layer
Your actual secret (password,
seed, API key e.t.c) is encrypted withTOTP using the resulting unique decrypted credential key. Again this has a a uniqueAES-256-GCM /IV andcounter (scope + policy). The authentication tag andAAD must verify before anything decrypts.AAD
- Every layer uses its own encryption key, unique
, andIV — no key or counter is ever reused.one time counter validation binds context (organisation, vault, credential, secret) to each encryption operation for integrity you can prove.AAD - Each vault, credential, and secret is isolated — compromise of one cannot unlock another.
- Organisation root keys are sealed in
and only ever used to wrap lower-level keys.AWS KMS - Each layer passes through strict access control and integrity checks.
At rest: four layers of protection
Think of your data like a series of locked boxes inside each other. Each layer of protection has its own unique key and security checks, so even if one box was opened, the others would stay sealed.
1) Organisation layer
Every organisation in Vauzy has its own master key, stored safely inside Amazon’s Key Management Service (
). This top-level key only unlocks the vault keys below it and never leaves its secure hardware.KMS 2) Vault layer
Each vault has its own key too. This means information from one vault can’t be read or decrypted by another, even inside the same account.
3) Vault–Credential relationship
Every connection between a vault and a specific login or secret gets its own unique key. So if a password changes, only those relationships are updated, everything else stays untouched and secure.
4) Secret layer
Finally, your actual secret, the password, 2FA code, or API key is locked again with another key that’s brand new every single time it’s used. Before anything can be decrypted, every layer must pass its integrity checks, proving it hasn’t been changed or tampered with.
- Each layer has its own key and random encryption value, nothing is ever reused.
- Every layer double-checks its identity and context before decrypting, this prevents mistakes or mix-ups.
- Vaults and credentials are fully isolated meaning access to one never exposes another.
- Organisation master keys stay sealed in
hardware, they’re never exposed to our systems or staff.AWS - Every decryption must pass multiple integrity checks before it succeeds with no shortcuts or silent errors.
