Let's recap what you've done so far:
- Created a CipherStash account and logged in to the CipherStash CLI.
- Created a dataset that defines the data you wanted to encrypt.
- Created a client key and access key that is used to authenticate Tandem with the CipherStash API.
- Deployed the CipherStash Tandem proxy as a Docker container and routed your database traffic through it.
- Enabled encryption on the
userstable in your database and removed the plaintext data.
- Verified that your application is still working as expected!
This guide is intended to be a quick start to get you up and running with Tandem while getting a feel for how it works.
Now that you have been through this getting started guide, consider how you could use this in a new or existing application. For more details have a look at the links below for more details.
- Check out the Tandem concepts on the website.
- Understanding what data you should protect. See the concept.
- Creating a dataset for your data. See the guide.
- Creating a unique client key. See the guide.
- Creating a programatic access key. See the guide.
- Using Tandem locally with your application. See the guide.
- Deploying Tandem with your application. See the guide.
- What are the limitations of Tandem? See the reference.
- Check out the FAQ for answers to common questions. See the FAQ.
- Read the CipherStash whitepaper to learn more about the underlying technology. Get the paper
Talk to a human
As a customer-focused business we are always keen to chat. If you have any questions or need help, just reach out by booking a call with one of our Solutions Engineers. We're happy to help!