Use case · regulated workloads

Use cheap storage without trusting the storage provider.

DeltaGlider encrypts objects before they reach the backend. The cryptographic key stays in your trusted environment, while compression can further reduce the storage bill.

live product
DeltaGlider Proxy advanced security settings
Controls

Controls built into the proxy.

The storage provider sees ciphertext. Your runtime keeps the key, policy, and operational controls.
AES-256-GCM proxy-side encryption at rest
Key supplied from your environment
Encrypted SQLCipher IAM/config database
ABAC permissions with source-IP and prefix conditions
Public read-only prefixes for controlled publishing
Soft bucket quotas and bucket freeze
Object replication through the engine
Audit ring and Prometheus metrics
Real-world scenarios

Common compliance patterns.

The proxy is useful when storage policy needs to stay close to your runtime, not hidden inside one vendor account.

Untrusted low-cost SaaS

A regulated team wants ultra-cheap S3-compatible storage, but cannot trust the provider with plaintext. DeltaGlider encrypts before the backend; the key stays on trusted premises.

Partner downloads

A release bucket needs public read-only access for a few prefixes, while everything else remains private behind IAM.

Secondary copy requirements

A regulated workload needs a cloud copy or offsite prefix. Replication runs through the proxy, so encryption and compression behavior stay consistent.
Evidence

Security features with code behind them.

Proxy-side encryption

Objects are encrypted with AES-256-GCM before they reach the backend. The key is supplied via DGP_ENCRYPTION_KEY and never leaves your trusted runtime environment.
src/storage/encrypting.rs

Encrypted config database

Users, groups, policies, and OAuth providers live in SQLCipher. The encrypted DB can sync across proxy instances through S3.
src/config_db_sync.rs

ABAC access control

Per-user S3 credentials, groups, prefix-scoped resources, and conditions on IP ranges and prefixes using AWS-style policy grammar.
src/iam/permissions.rs
Object replication

Copy data through the same control plane.

Replication rules copy objects between buckets or backends while preserving proxy-side encryption and compression behavior.
live product
DeltaGlider Proxy object replication configuration
Product view

Pause rules, run now, review history and failures, and replicate deletes when needed.

Next step

Map your storage controls.

Send the requirements that matter: keys, identity, quotas, replication, audit, and deployment constraints.