Data Handling and Encryption
TruthVouch uses industry-standard encryption and key management to protect your data throughout its lifecycle.
Encryption at Rest
Algorithm: AES-256 (FIPS 140-2 approved) Key Length: 256-bit keys Storage: Encrypted database volumes (AWS EBS encryption) Backups: AES-256 encrypted with separate keys
What’s Encrypted
- User data: Truth nuggets, knowledge base
- Audit logs: Complete request/response history
- API keys: Scoped credentials
- Backups: All backup copies encrypted
- Everything except non-sensitive metadata
Key Rotation
- Frequency: Automatic monthly rotation
- Old Keys: Retained for 90 days (data re-encryption)
- HSM: All keys stored in AWS CloudHSM (never on disk)
Encryption in Transit
Protocol: TLS 1.3 (HTTPS everywhere) Certificate: Wildcard certificate, auto-renewed Pinning: Optional certificate pinning for Enterprise
All communication encrypted:
- API calls (REST)
- WebSocket (real-time updates)
- Webhooks (outbound)
Key Management
Hardware Security Module (AWS CloudHSM):
- Keys never leave the HSM
- MFA required for key access
- Geographic redundancy
- Annual security audits
Access Control:
- Role-based access to encryption keys
- Least privilege principle
- All key operations logged
- Automatic lockdown on suspicious activity
Data Classification
Different data types encrypted differently:
| Data Type | Encryption | Key Rotation | Retention |
|---|---|---|---|
| Sensitive (PII, API keys) | AES-256 + HSM | Monthly | 7 years |
| User Data (truth nuggets) | AES-256 | Monthly | Indefinite |
| Audit Logs | AES-256 + Hash Chain | Monthly | 7 years |
| Metadata | AES-128 | Quarterly | Indefinite |
Data Residency
Choose where your data is stored:
- US: AWS us-east-1 (Virginia)
- EU: AWS eu-west-1 (Ireland) — GDPR compliant
- Custom: Your own AWS account (Enterprise)
- On-Premises: Self-hosted (Enterprise)
Data never leaves chosen region.
Deletion
When you request deletion:
- Data marked for deletion in database
- Deleted from live systems within 24 hours
- Removed from backups within 30 days
- Removed from long-term archives within 90 days
- Cryptographic erasure (keys destroyed) after retention period
Deletion is permanent and irreversible.
Compliance
- FIPS 140-2: Cryptographic standards
- NIST: AES-256 approved by NIST
- GDPR: Encryption required for data protection
- SOC 2: Encryption as part of system controls
- HIPAA: Encryption for healthcare data
Next Steps
- Multi-Tenancy: Learn about data isolation
- Key Management: Understand key rotation and backups
- Deletion: Learn about data deletion procedures