Logo

Download
What is Acra

What is Acra? An overview. #

Acra is a application-level encryption and data security toolkit for modern distributed applications. Acra allows app developers to encrypt sensitive data, manage the keys, apply tokenization, data masking, request filtering, generate audit logs and security events, automate reactions on security boundary.

In short, Acra provides you with means to protect the data, detect incidents and respond to them.

Acra is written in Go, aimed for modern cloud applications that store sensitive data in any databases. Acra consists of several components that apply security controls exactly where the data flows.

Acra’s typical use cases #

Unlike many security software tools, Acra uses cryptography as main line of defense. When data is encrypted, it can’t be suddenly and unnoticeably decrypted.

  • Secure data vault: put your sensitive data in a separate database, then protect it with Acra so that high-risk data has separate protection infrastructure built around it. Encrypt, anonymize, mask or tokenize sensitive data. Filter suspicious SQL queries, detect and prevent data leaks, produce tamper-proof audit log.

  • Quick and transparent integration of encryption: quickly integrate Acra into your existing applications that rely on MySQL/PostgreSQL-compatible databases with minimum amount of re-engineering effort - days instead of months. Acra will encrypt/decrypt data fields “on the fly”, while your application and database don’t know that the data is encrypted.

  • Developer-friendly data security module: integrate security controls in your infrastructure without diving into security detail too deeply. Even in case of the incident, your data is encrypted.

  • Secure data lifecycle tool: protect sensitive data’s journey in your product, from database to all the microservices, backups, logs and all. Use single encryption model across data’s lifecycle: encrypt in Acra as you write the data to the database, pull encrypted text, pass it between microservices and decrypt later by talking to API service / SDK, while using keys from the same datastore. Operate on encrypted data. Even build end-to-end encrypted dataflows.

  • Unified set of security controls towards data: you don’t need to maintain different software pieces implementing same security controls in different places, you don’t need to write cryptographic code in your apps.

  • Gain visibility and transparency: with tamper-proof audit logging in Acra you have proofs of who/when/how has accessed the data or tried to change the logs.

  • Detect and prevent incidents: automate Acra’s reactions to detect potential leakage and protect sensitive data and/or keys during security incidents.

  • Achieve complaince in data security and privacy while actually increasing practical security posture. (Best of two words: compliance and actual pragmatic security.)

Acra essentially moves security boundary as close to the data itself as possible without sacrificing security and usability, and provides a number of defense-in-depth mechanisms to protect the data.

Major security features #

  • Cryptographic security: data is encrypted during storage and transmission via application-level and transport-level encryption with strong mutual authentication.
  • Searchable encryption: address encrypted records (use them in SELECT queries with WHERE clause) without revealing them to the database.
  • Selective encryption: you pick what, where and how gets encrypted.
  • Data masking and tokenization: anonymise or pseudonymise the data preserving its original format.
  • Key management tooling: flexible management of rolling/rotation/revocation to suit your load needs and data architecture.
  • SQL request firewall: prevent SQL injections, stop unauthorized and suspicious queries.
  • Intrusion detection system: detect data leakage using poison records and SIEM integration.
  • Logging, monitoring and security events: always have operational and security overview on what’s happening with your data.
  • Tamper-proof audit logging: Acra produces audit log that prevents unnoticeable changes.
  • Policies: expressive policy language that allows to configure Acra’s behavior in large infrastructures.

Refer to Acra-in-depth / Security features to learn more.

Architecture #

Acra consists of several services and utilities. Depending on your architecture and use case, you might need to deploy only basic services or all of them.

  • Security enforcement components: services where “encryption happens”. One of them is required.
  • Key storage: datastores where Acra keeps encrypted keys: Redis, table in your database, any KV store. One of them is required.
  • Master key storage: KMS, Vault. One of them is strongly recommended..
  • Additional services and utils: key management utils, data migration scripts, transport security service, policy management tools. Any of them are optional.

Acra provides security enforcement components in different shapes:

  • AcraServer, also known as SQL Proxy. It’s a database proxy that exposes Acra’s functionality by parsing SQL traffic between an app and a database and applying security functions where appropriate.

  • AcraTranslator, also known as API service. It’s an API server, that exposes most of Acra’s features as HTTP / gRPC API with client SDKs and traffic protection.

  • AnyProxy. It’s an API server that works between several API-driven microservices/applications. AnyProxy can transparently forward requests/responses so your applications stay “thin clients”.

  • Client-side SDKs. Acra provides optional SDKs for encrypting data (AcraWriter), for decrypting data (AcraReader), or for working with AcraTranslator.

Acra services allow you to construct infinitely sophisticated data flows that are perfectly suited to your exact infrastructure.

Refer to Acra-in-depth / Architecture to learn more about Acra services.

Typical deployment architectures #

So, which Acra services and components you need? Depends on your use case!

  1. If you are using SQL database and want to integrate Acra “transparently” for your app – use AcraServer and Key storage. See the simplest dataflow with AcraServer.

  2. If you are using NoSQL / KV datastore, and your application speaks to API to encrypt/decrypt data – use AcraTranslator and Key storage. See the simplest dataflow with AcraTranslator.

  3. If you have many applications and want to encapsulate their communication with sensitive data, try DAO approach (data access object). Use AnyProxy, see AnyProxy dataflow.

  4. If you are building end-to-end encrypted dataflow, use Acra’s SDKs: AcraWriter, AcraReader, and combine them with AcraServer / AcraTranslator. See the End-to-end encrypted dataflow.

Refer to Acra-in-depth / Dataflow to see more examples of Acra-based dataflows.

Why Acra #

Acra allows you to protect sensitive data inside your infrastructure / product efficiently, with a number of modern security controls.

There are many regulatory, business risk and security rigorousness reasons to use Acra, they are typical to usage of any data protection / leakage prevention / encryption software:

  • protecting sensitive data to prevent unauthorized parties from accessing it (including insiders and advanced persistent adversaries);
  • encrypting sensitive data due to compliance requirements;
  • building security boundary around sensitive data to protect and provide visibility into the way it is used;
  • reinforcing database security measures with external security controls;
  • building separate vaults of sensitive data with enhanced security.

Refer to Regulations section to learn how Acra can help you to satisfy particular requirements of various regulations.

Let’s see how Acra is actually different from many products and approaches.

Application-level encryption, field-level encryption #

Acra allows you to efficiently pick fields of your data model and encrypt them. When done right, application-level encryption protects your sensitive data from more sensitive risks than other encryption modes.

Application-level encryption brings plenty of security benefits:

  • ALE enables mapping of keys to users/entities/tenants, BYOK, more advanced key layouts, etc.
  • ALE enables application developers and architects to distribute additional computing load and bottlenecks as they wish, thus making security less of a performance challenge, if it ever was.
  • ALE means that data remains encrypted until it is explicitly decrypted, which is not the case with TLS and data-at-rest encryption provided by databases by default.

Risk implications #

Acra guarantees that no amount of data and/or secrets leaked from the database could be sufficient for decryption of the data stolen from the database. This is achieved through cryptography rather than through general system design.

Acra changes your risk model drastically - you can now deal with more security risks with less security controls, and you need to monitor a smaller attack surface.

Acra moves the security boundary closer to the data. Insiders, privileged attackers, DBAs, infrastructure administrators have less opportunity for unauthorized access and there are no implicit “trusted paths” to access the data without authorization/authentication/security control application.

Refer to Acra-in-depth / Security design section to learn more about Acra’s security design, principles, trust models and security guarantees.

Choke point security #

Since Acra sits on choke point to data access, it can enforce additional security restrictions on the data if you need it, and you can be sure that whoever wants to access plaintext will need to go through all these controls.

Key design principles #

Security #

There are following security design principles that you can achieve by using Acra:

  • Defense in depth: Acra delivers different layers of protection for different parts and stages of the data lifecycle. Acra provides an independent set of security controls aimed at mitigating multiple risks in case of an attacker crossing the outer perimeter.
  • Trust compartmentalisation and strong isolation: each data record is encrypted by unique data encryption key, each data encryption key is encrypted by customer/application key.
  • Zero trust: by default, nobody under no assumptions have access to the sensitive data if it’s encrypted with Acra.
  • Secure by default: Acra’s default configurations are more security, less trust.
  • Security controls: layered blend of protective, detective and responsive controls.

Refer to Acra-in-depth / Security design section to learn more about Acra’s security design, principles, trust models and security guarantees.

User experience #

  • Quick and straightforward integration of security instrumentation: there are many behavioral and organisational challenges which prevent security work from happening. To enable better security, security instrumentation should be as developer/operations friendly as possible.
  • Hard to misuse: world has a multitude of amazing security technologies. Unfortunately, if these technologies can be misused in a way that will lead to lowering of their security impact (with a false sense of security attached), they will be. Acra actively resists misuse that has security impact, where possible – provides secure-by-default options, validates configuration files, notifies on suspicious activity, etc.
  • Crypto under the hood: Acra doesn’t require deep cryptographic expertise for proper usage. Cryptographic details are abstracted.
  • Transparent and code-less integration: in some of Acra’s scenarios, it is possible to avoid changing your application code completely.
  • Full operational control: Acra provides logs, events, metrics and 360 degree operational and security overview into Acra’s inside processes if you ned that.

Licensing and form-factors #

Acra Community Edition #

Open source and free Acra Community Edition. Apache 2 licensed.

Acra Community Edition supports all major security features, but has a limited support for platforms, integrations, databases. Best for prototyping and small-scale projects with Ops team. You take open source Acra, configure and deploy it.

See list of features on Cossack Labs’s site.

Acra Community Edition & services #

Open source and free Acra Community Edition, boosted by Cossack Labs integration services.

Get our engineering assistance in configuring, optimizing, scaling Acra. Build custom solutions around Acra CE. Train your team in building secure and reliable systems. Best for small-scale projects without Ops team. You take open source Acra, we assist with configuration and deployment.

See list of services on Cossack Labs’s site.

Acra Enterprise Edition #

Acra Enterprise Edition is licensed with proprietary licenses. It is compatible with Acra CE (you can start from CE and migrate to EE later).

Acra Enterprise Edition supports all security features and is tailored for large infrastructures. Acra EE provides key management utils and policies to configure and control Acra automatically. Best for enterprise businesses with multiple apps / databases. You take Enterprise Acra, we assist with configuration, policies, deployment, support.

See list of features on Cossack Labs’s site.

Refer to Acra Enterprise Edition to learn more or drop us a line describing you use case.