Encryption
On this page
Overview
This document covers SingleStore Helios data encryption in transit and at rest.
Encryption in Transit
To ensure a secure connection to SingleStore Helios, SQL clients must be properly configured to require a secure connection, and to verify the supplied server certificate.
When a SingleStore Helios workspace has REQUIRE SSL
enabled, users cannot connect to the workspace without using SSL.
To circumvent these potential issues, SingleStore supports TLS 1.
The SSL/TLS cipher suite used is AES128-GCM-SHA256, with SSL certificates on a one-year rotation for svc.
and on a two-year rotation for the legacy db.
.
Refer to Connect to SingleStore Helios using TLS/SSL for additional information.
Encryption at Rest
For data at rest, SingleStore uses best-practice AES-256 encryption with AWS, Azure, and GCP cloud-hosting partners.
For the Data Plane, SingleStore logs all access to each SingleStore Helios workspace, and runs each workspace with audit logging enabled.
In this section
Last modified: June 26, 2024