How we address confidentiality
Encryption in transit and encryption at rest
Databunker Pro enforces full encryption in transit and at rest by default. All network requests are secured using SSL encryption protocols.Record encryption
Customer personal information records are encrypted using AES-256 keys or securely hashed in the product internal database. AES-256 encryption is FIPS 140-2 compliant and meets federal cryptographic standards.Encryption of audit events
Personally Identifiable Information (PII) in audit events is fully encrypted.Secure hash-based search index
Databunker Pro extracts emails, phone numbers, and login names from user records to build a hashed-based search index. This method allows secure lookups of original user records.Backend database connectivity
Databunker Pro supports both PostgreSQL and MySQL as backend databases, connecting through a secure SSL channel. Note: Multi-tenancy is only supported with PostgreSQL and is not available when using MySQL.FIPS compliance
Databunker Pro uses FIPS 140-2 compliant cryptographic algorithms for core security operations:- Certificate generation: When deploying via Helm, certificates are generated using RSA 2048-bit key length, which is FIPS compliant.
- Record encryption: All customer records are encrypted using AES-256, a FIPS-approved symmetric encryption algorithm.
- Go runtime: The Go programming language runtime does not enforce FIPS mode internally, allowing Databunker Pro to operate in FIPS-enabled environments while maintaining compatibility.
- As a distributed lock mechanism in the
usersanduserappstables to prevent concurrent modifications - As part of a double-hash (SHA256 + MD5) for duplicate detection in format-preserving tokenization engine
- As salt material (MD5 of master key) for SHA256-based indexing of user records (e.g., email, phone numbers)