Overview
CipherStash Proxy provides a transparent proxy to your existing Postgres database.
- Automatically encrypts and decrypts the columns you specify
- Supports most query types over encrypted values
- Runs in a Docker container
- Is written in memory-safe Rust and uses a formal type system for SQL mapping
- Works with CipherStash ZeroKMS (backed by AWS's industry-leading key management service AWS KMS)
Proxy keeps encrypted data searchable, with searchable encrypted indexes for text and numeric data. The data being searched is never decrypted. You get fine-grained data protection in minutes.
CipherStash Proxy works by transparently encrypting data and transforming queries to and from your application and your database. Proxy analyzes SQL queries, encrypts data going into PostgreSQL, and decrypts data coming out of PostgreSQL. With a unique encryption key for every column, in every row, in every table, you get extremely fine-grained visibility of when and what sensitive data is being accessed.
Highlights
- No changes in your app. Put CipherStash Proxy between your app and your database and let it transparently encrypt your sensitive data for you.
- For companies working with sensitive data, CipherStash Proxy encrypts the data before it hits the database, while maintaining your app's ability to query it with normal SQL.
- Searches of encrypted data are fast, adding only milliseconds to query execution time in PostgreSQL. CipherStash Proxy is easy for devs to set and forget, so your teams can focus on shipping quality features instead of doing data security acrobatics.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/unit |
---|---|---|
Cipherstash Cloud | Usage based pricing - refer to Additional Usage under Product Overview | $0.01 |
Vendor refund policy
Please contact your account representative to discuss refund options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
ContainerImage
- Amazon ECS
- Amazon EKS
- Amazon ECS Anywhere
- Amazon EKS Anywhere
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
April 2024 release version of CipherStash Proxy
Additional details
Usage instructions
Please see https://cipherstash.com/docs for the latest deployment instructions
Support
Vendor support
Customer support is available at support@cipherstash.com , or contact your Account Manager.
Sign up for an account at https://cipherstash.com/signup so you can start using CipherStash Proxy.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.