Application Layer Encryption
Application layer encryption is a data security measure that encrypts data within the application itself, before that data is transmitted to another system or written to storage. Unlike disk-level encryption, which protects data by securing the physical storage medium, application layer encryption protects data at the point where the application handles it. This means the data may remain encrypted even as it moves through other parts of a system's infrastructure.
Application layer encryption (ALE) is an architectural approach in which encryption and decryption operations are performed within the application layer, prior to data being passed to a data store, transmitted over a network, or otherwise handed off to underlying infrastructure components. This is distinct from transport-layer encryption (such as TLS), which protects data in transit between endpoints but leaves data accessible at those endpoints, and from storage-level or disk encryption, which protects data at rest on physical media but typically exposes data to any process with filesystem access. ALE enables data to remain encrypted at rest in databases and object stores in a form that is opaque to the data store itself, to database administrators, and to other infrastructure-level actors who may have access to the underlying storage. Key management responsibilities in ALE are handled at the application level, and the approach can apply to nearly any data type passing through the application.
Why it matters
Transport-layer encryption such as TLS and disk-level encryption each address specific threat vectors, but neither protects data from parties who have legitimate access to the infrastructure itself. Database administrators, cloud storage operators, backup systems, and any process with filesystem access may be able to read data that is encrypted only at the transport or disk level. Application layer encryption addresses this gap by ensuring that data remains opaque to the underlying data store and to infrastructure-level actors, because decryption is controlled within the application and requires access to application-managed keys.
Who it's relevant to
Inside ALE
Common questions
Answers to the questions practitioners most commonly ask about ALE.