Data at Rest
Data in Transit
Data in Use
Index & Query Metadata
Capability | Example Sources |
---|---|
Full disk access | Stolen storage volume, cloud snapshot |
Full memory access | Compromised hypervisor, malicious kernel module |
Network interception | BGP hijack, malicious ISP |
Log & telemetry access | Misconfigured logging, compromised SIEM |
Code execution on server | Supply chain attack, RCE in application stack |
Attack Vector | Mitigation | Residual Risk |
---|---|---|
Disk theft | AES-256-GCM encryption at rest | Key theft from KMS would bypass |
Memory scraping | In-use encryption with ephemeral node keys | Queries in progress may suggest active clusters |
Index structure analysis | Forward privacy & per-insertion randomization | Search pattern leakage still possible within active session |
Embedding inversion | Encrypted embeddings never stored/processed in plaintext | Compromised client could still expose |
Network interception | TLS + AEAD | Endpoint compromise would still allow decryption |
Query correlation | Forward-secure cryptographic counters | Statistical attacks on large query volumes |
Cross-system linking | Per-record key derivation with unique IVs | Metadata correlation if encryption keys compromised |