Standard Encryption
The credential protection layer applied automatically to every NeoSQL project. It works with no setup; if you need a stronger guarantee, layer Zero-Knowledge mode on top.
Security model overview
NeoSQL's security goal is "even operators cannot see your data."
| Aspect | Standard | Zero-Knowledge |
|---|---|---|
| Encryption algorithm | AES-256-GCM | AES-256-GCM (same) |
| Encryption key protection | AWS KMS Envelope Encryption | User secret key (Argon2id) — no KMS |
| Operator plaintext access | Hidden from admin console; theoretically possible with code + KMS access | Impossible without the secret key |
| Recovery if key lost | Operators can help via KMS | No recovery (intentional trade-off) |
| When applied | Auto-applied to all projects | Per-project explicit opt-in |
Standard protection — applied to every project automatically
The moment you create a project, NeoSQL encrypts the following 15 credential fields with AES-256-GCM.
15 encrypted fields
- Connection-level (shared by project members): host · port · URL · database · DB user · DB password · SSL client cert · SSL client key · SSL client key password
- User-level (per member): SSH username · SSH password · SSH private key · SSH passphrase · proxy username · proxy password
AWS KMS Envelope Encryption
A unique DEK (Data Encryption Key) is issued per project and the DEK itself is wrapped by AWS KMS Customer Master Key. Even if the entire server database is leaked, no credential can be decrypted without the KMS key.
Plaintext credentials never appear in the UI
Connection lists, project screens, and ERDs never display passwords or certificates in plaintext. Only the edit modal handles them as masked input.
Standard protection — encryption flow
User → KMS-DEK → AES-256-GCM → 15 fields. KMS CMK seals the DEK so even an operator without KMS access cannot reach credentials.
NeoSQL administrator access policy
The administrator console (CMS) shows operational data only — user ID, email, subscription status. It NEVER displays user DB credentials on any screen.
Under standard mode, an operator with both code access and KMS access could in theory decrypt credentials by querying the database directly through the KMS API. Zero-Knowledge mode closes this last gap by removing the operator's ability entirely.
