Security & Architecture

Security built around zero vendor trust

WSData is designed so plaintext files and messages never need to exist inside WSData-controlled infrastructure.

Encryption icon
Encryption model

AES-256-GCM, client-side encryption, encrypted before upload, and no readable data on WSData servers by design.

Key icon
Key ownership

Customers control keys inside their own cloud boundary, with KMS and HSM-ready positioning for mature security programmes.

Architecture icon
Customer cloud boundary

Encrypted storage, access policy, hosting, domain, and operational ownership stay with the customer, not a shared vendor vault.

Threat model

What WSData is designed to reduce.

Designed to protect against
  • Vendor breach exposing readable customer data.

  • Vendor insider access to plaintext files or messages.

  • SaaS central breach target risk.

  • Storage compromise where attackers obtain encrypted blobs only.

Not designed to replace
  • Endpoint security for compromised user devices.

  • Strong identity controls for stolen user credentials.

  • Good internal access governance, approvals, and user lifecycle management.

Security principles

Simple principles, enforced by architecture.

No plaintext

Readable customer data is kept outside WSData infrastructure.

No backdoors

Access is designed around customer-controlled keys and explicit authorisation.

No central readable-data honeypot

Customer data is not pooled into a shared vendor plaintext target.

Customer-controlled infrastructure

Storage, keys, domain, hosting, and access policy stay inside the customer boundary.

Verifiable authenticity

Cryptographic provenance makes document origin and tamper status mathematically verifiable.