Yoko 5c5586759f
Transit rewrap (#4091)
* Adding new guides

* Replaced backend with engine

* Grammar for the encryption guide

* Grammar and Markdown style for the Transite Rewrap guide

See
https://github.com/hashicorp/engineering-docs/blob/master/writing/markdown.md
for notes on numbered Markdown lists.

* grammar and wording updates for ref arch guide

* Updating replication diagram

* Removing multi-tenant pattern guide

* Added a note 'Enterprise Only'

* Removing multi-tenant pattern guide

* Modified the topic order

* Grammar and Markdown formatting

* Grammar, Markdown syntax, and phrasing

* Grammar and Markdown syntax

* Replaced 'backend' with appropriate terms

* Added a note clarifying that replication is an enterprise-only feature

* Updated the diagram & added additional resource links

* update some grammar and ordering

* Removed the inaccurate text in index for EaaS
2018-03-19 14:56:45 -07:00

22 lines
858 B
Markdown

---
layout: "guides"
page_title: "Encryption as a Service - Guides"
sidebar_current: "guides-encryption"
description: |-
The transit secrets engine handles cryptographic functions on data in-transit.
Vault doesn't store the data sent to the secrets engine. It can also be viewed
as "cryptography as a service" or "encryption as a service".
---
# Encryption as a Service
Vault provides Encryption as a Service (EaaS) to enables security teams to
fortify data during transit and at rest. So even if an intrusion occurs, your
data is encrypted and the attacker would never get a hold of the raw data.
This guide walks you through Encryption as a Service topics.
- [Transit Secrets Re-wrapping](/guides/encryption/transit-rewrap.html) guide
demonstrates one possible way to re-wrap data after rotating an encryption key
in the transit engine in Vault.