Cloaked Search

Sensitive data stored in Elasticsearch and OpenSearch is vulnerable to hackers. Secure it with searchable, drop-in, application-layer encryption.

Searchable encryption so you can encrypt and then search

Reduce risk by protecting data at the application layer

Application-layer encryption (ALE) provides strong protection against breaches, unauthorized insider access, injection attacks, and cloud misconfigurations.

Protects your sensitive data while allowing rich analytics

Secure personally identifiable info (PII) and other data without losing your ability to find or run analytics on it. Works with logs, user-generated content, and other enterprise data.

Comply with privacy and security regulations

Meet the strictest data security obligations without losing functionality. Comply with the data protection requirements in privacy laws by encrypting the data.

Drop-in protection without code changes

The Cloaked Search proxy sits in front of your search cluster and doesn't require code changes or plugins to use so you can seamlessly encrypt and search.

Why it matters

Your search service is a treasure trove of data and a hacker's dream

Too often companies focus on the primary data storage but ignore the secondary ones like the search service and log data, which can contain incredibly sensitive information and are rich targets for attackers and impulsively curious insiders.

Familiar stack

Integrates with your existing search service

We support both OpenSearch and Elasticsearch,® the two most populare search services in applications and cloud infrastructures. Cloaked Search can protect either one seamlessly with no server-side plugins required.

Meaningful encryption

Data protection for always-on cloud servers

Encryption requires the correct key to unlock the data. But when you use low-level encryption like database or disk encryption, the key has already unlocked the data and stays in memory for as long as the server is running. This doesn’t do much to protect data in the cloud.

The alternative is application-layer encryption (ALE) which encrypts data before storing it and keeps the key(s) separate from the data. It’s a simple, but powerful concept that often prevents network breaches, cloud misconfigurations, and application vulnerabilities from turning into costly data breaches.

Privacy guarantee

Completely blind services

IronCore never sees your data. All data encryption and decryption is done inside your app and you store the encrypted data.

Some of our products make use of our cloud services to facilitate the handing out of encrypted configurations, encrypted private keys, or public keys. IronCore is never in a position to see unencrypted data, to decrypt encrypted data we hold, or see your keys.

Additionally, some of our products can operate entirely within your own infrastructure with no external service needed.

No key, no access

What is encrypted search?

A search index is much like a book index. It contains a list of words that point back to the locations where they appeared. But this data can be used to recreate the entire book. And in most cases, the search service actually retains the original book, too. Yet for most companies, the data in the search index isn’t protected at the same level as other data stores.

Encrypted search is a technique that encrypts both the raw data and the index. The data can still be searched over without decrypting it, but anyone who wants to search it must have the right key. The server is blind to the data it holds and to the meaning of the searches that are made.

Features

All the search functionality you need without the risk

Query logic George AND (Coffee OR Mug)
Exact phrases "IronCore Labs"
Prefix/suffix wildcards Iron*
Phonetic matching Kathryn == Catherine
Field and subdocument search title:security author.name:george
Single and multi-tenant Key per data segment
Complex result rankings (weighted fields, etc.)
Multi-index Search multiple indices at once

You choose which fields to encrypt on which indices. You can do everything on unencrypted fields, and nearly everything on the encrypted ones.

Encryption is best suited to text fields such as name, email, address, health data, and user-generated content. Nearly all of the functionality you love from Elasticsearch and OpenSearch can be used over the encrypted data.

While not everything is supported, for example, you can’t do regular expression searches over the encrypted data, all of the most commonly used features are.

And most of the time, you don’t even have to change your code.

How it works

Drops in as a proxy between your app and your search service

Single key standalone mode

In standalone mode, a single key is loaded into the proxy at startup and that key is the root of trust for securing all the data. This is the simplest deployment available. Simply configure which fields you want encrypted in which indices, then point your code to the proxy instead of the search service.

Multi-key advanced key management

When you need different keys for different segments of data or when you want to make sure the service provider (eg, Amazon, Google) can’t gain access, then you can integrate SaaS Shield as a key orchestration component for keeping master keys in one or more independent key management servers. This is especially useful for multi-tenant SaaS and customer-held encryption key patterns.

Use cases

Built for people who need to use the sensitive data they hold

Benefits

Find your encrypted data without sacrificing security

1. Protect

Secure sensitive customer PII in Elasticsearch or OpenSearch without compromising on privacy or data security.

2. Comply

Encryption means customer PII remains safely locked away so you can comply with GDPR, CCPA, and more.

3. Drop-in

No need to reinvent the wheel or rewrite your code. Keep existing code and infrastructure.

Next steps

Learn more or give it a try

Read our docs

Check out our thorough documentation that explains deployment, configuration, and internals in depth.

Read the docs

Use the online demo

Explore an already-running instance seeded with data and a web interface for you to explore and learn.

Try the live demo

Try it locally

Get started with a local docker image to try it out. Just follow the instructions in our try-cloaked-search GitHub repo.

Test locally