Real security, explained simply.

Vauzy keeps your secrets safe. We use strong locks, short keys that change often, and checks that make sure only you can open your stuff.

How should we explain this?
Whether you prefer a plain-English overview or a deep dive into encryption details, you can view our security model in the way that suits you best.

We lock your data with proven tech

Your secrets are scrambled using the same kind of protection trusted by banks and hospitals. If someone steals a copy, all they get is unreadable gibberish.

  • Each lock is unique and checked before anything opens.
  • We never reuse keys in a risky way.
  • If anything looks wrong, it won’t open at all.

Built-in safety steps

  • Fresh, high-quality randomness every time we lock or unlock.
  • Extra labels attached to each lock so we can spot tampering.
  • Safe ways to change keys without breaking your data.
Trusted everywhere:
BankingGovernmentHealthcareInsuranceLawMilitary

Safe when stored. Safe when sent.

Your data is protected in two ways: when it sits in our databases, and when it travels across the internet. We use short-lived keys that change often and checks that prove everything is legit.

At rest: four layers of protection

Think of your data like a series of locked boxes inside each other. Each layer of protection has its own unique key and security checks, so even if one box was opened, the others would stay sealed.

  1. 1) Organisation layer

    Every organisation in Vauzy has its own master key, stored safely inside Amazon’s Key Management Service ( KMS ). This top-level key only unlocks the vault keys below it and never leaves its secure hardware.

  2. 2) Vault layer

    Each vault has its own key too. This means information from one vault can’t be read or decrypted by another, even inside the same account.

  3. 3) Vault–Credential relationship

    Every connection between a vault and a specific login or secret gets its own unique key. So if a password changes, only those relationships are updated, everything else stays untouched and secure.

  4. 4) Secret layer

    Finally, your actual secret, the password, 2FA code, or API key is locked again with another key that’s brand new every single time it’s used. Before anything can be decrypted, every layer must pass its integrity checks, proving it hasn’t been changed or tampered with.

Four layers. One unbreakable chain.
Your data doesn’t just get locked once, it’s wrapped in four separate, uniquely keyed layers. Each key is used only once, checked for accuracy, and verified for integrity before it ever unlocks the next.
  • Each layer has its own key and random encryption value, nothing is ever reused.
  • Every layer double-checks its identity and context before decrypting, this prevents mistakes or mix-ups.
  • Vaults and credentials are fully isolated meaning access to one never exposes another.
  • Organisation master keys stay sealed in AWS hardware, they’re never exposed to our systems or staff.
  • Every decryption must pass multiple integrity checks before it succeeds with no shortcuts or silent errors.

In transit: locked from end to end

Whenever you log in with your passkey, your device and Vauzy quickly create a shared secret handshake that only they know. This secret lives for just a few minutes, never leaves your device’s memory, and encrypts everything sensitive you send or receive.

  1. 1) Secure handshake

    When you authenticate with your passkey, your device proves who you are using biometrics, then swaps coded “public keys” with Vauzy. Both sides use these to create a shared secret known only to them for this short session.

  2. 2) Memory-only keys

    The encryption keys never get written to local storage or cookies, they live only in memory while you’re active. Close the browser tab, and the keys vanish completely. Each tab starts its own secure session.

  3. 3) Always encrypted in motion

    When you view or update credentials, your browser encrypts the data before it leaves your device. It travels through Vauzy’s systems as scrambled text, even our servers can’t read it. Inside our isolated AWS environment, a secure processor briefly decrypts it only to store or send it back to you.

  4. 4) Auto-refreshing keys

    Every few minutes, Vauzy automatically performs a new handshake and generates a fresh encryption key. This constant key rotation means even if someone could capture a key, it would already be expired before it could be used.

Zero storage. Zero exposure. Zero chance.

End-to-end encryption means exactly that — only your device and our secure data processor ever see decrypted information. Everything else that touches it, from our APIs to our message buses, only sees encrypted data.
  • Encryption keys exist only while you’re logged in and disappear when you leave.
  • New shared secrets are created automatically every few minutes.
  • All data in motion stays encrypted — our systems can handle it, but can’t read it.
  • Every encryption key is linked to your biometric-verified passkey session for total identity assurance.

Integrity first: if anything looks off, it won’t open.

Short-lived secrets: keys change often and expire quickly.

We can’t see your secrets: we handle scrambled data, not the actual values.

Runs on AWS. Locked down by default.

AWS foundation

We use Amazon’s cloud. Our data sits in its own private area with tight gates.

Encrypted message bus

Our internal chats between services are encrypted. No plain text on the wire.

Protected keys

Important top-level keys are guarded by AWS and closely tracked.

We use least-privilege access, firewalls, private networks, and encrypted backups.

Additional key security features

Replay protection

Every request is unique and can only be used once. If anyone tries to resend it, it’s automatically blocked, keeping your data safe from replay attacks.

  • Each action can only happen once
  • Old or duplicate requests are automatically rejected

Fine-tuned access control

Control who can see or change credentials down to the vault level. Give teammates the access they need and nothing more.

  • Different roles for admins, editors, and viewers
  • Billing access kept completely separate

Zero-knowledge design

Your secrets are encrypted before they ever leave your device. Even Vauzy can’t see your passwords or 2FA codes, only you can decrypt them.

  • Data stays encrypted end-to-end
  • We never see or store your plaintext credentials

Transparent activity logs

Every action is tracked and time-stamped. You’ll always know who accessed what and when, across both client and team accounts.

  • Instant visibility into vault activity
  • Shared logs build trust between teams and clients

Passwordless login

Forget master passwords. Vauzy uses secure passkeys which are backed by your device’s biometric login, so you can sign in safely without remembering a thing.

  • Face ID, Touch ID, or Windows Hello supported
  • No passwords to forget or share

Short-lived sessions

You stay logged in just long enough to work securely. After a few minutes, sensitive actions require a quick re-authentication for added protection.

  • Automatic timeout after a short window
  • Fresh verification for sensitive actions

Frequently asked

What if someone steals a database backup?

They only see scrambled data. Without the right keys, it’s useless.

How do you stop repeated requests?

We use one-time numbers and short timers. Copies and late replays get blocked.

Security that scales with you

From single teams to agency–client networks, Vauzy keeps secrets safe without slowing you down.