top of page

RED (Rhea Encrypted Data)

Zero-knowledge data protection built for environments where trust alone is no longer enough

RED is Rhea’s data protection platform.

 

It is built to protect sensitive data before storage, keep access under explicit cryptographic control, and reduce reliance on infrastructure trust, provider trust, backend privilege, and administrative visibility.

 

RED does not exist to replace existing cloud infrastructure, storage systems, or enterprise environments. It exists to apply a stronger protection model above supported environments, so organizations can keep using their infrastructure while reducing unnecessary plaintext exposure and strengthening control over access.

 

Most systems still depend on a weak assumption: that whoever controls the platform, backend, storage layer, or administrative environment can ultimately be trusted with the data.

 

RED is built on a different assumption:

 

sensitive data should remain protected even when infrastructure is shared, distributed, outsourced, or exposed to multiple internal and external systems.

 

That is the purpose of RED.

 

 

 

The problem RED is built to solve

Sensitive data now moves across cloud platforms, SaaS systems, internal workflows, employee devices, backup environments, vendors, analytics pipelines, AI tooling, and external processors.

 

In most environments, that creates a structural security problem.

 

Too many systems and too many parties can potentially access plaintext data, encryption keys, or the operational context around protected information. Even where traditional security controls exist, organizations still end up depending on broad backend permissions, privileged services, infrastructure visibility, provider-side trust, and administrative assumptions.

 

That model becomes weaker as environments become more distributed.

 

The issue is not that existing infrastructure is useless. The issue is that infrastructure alone is not a sufficient protection boundary for highly sensitive data.

 

RED is designed to solve that problem at the protection layer itself.

 

What RED is

RED is a zero-knowledge data protection layer.

 

It is designed to protect data before it leaves the user’s environment, keep plaintext access out of the default infrastructure path, and enforce access through cryptographic authorization rather than relying only on backend permissions, storage provider trust, or admin-level visibility.

 

RED is not simply another storage platform.

 

RED is not just server-side encryption.

 

RED is not a collaboration product with security features added later.

 

RED is a dedicated protection layer designed to keep security attached to the data itself across supported environments.

 

At its core, RED is built around three principles:

 

Protection before storage

Sensitive data is encrypted before storage, sharing, or controlled processing.

 

Explicit cryptographic access

Access should require authorization under the protection model itself, not just trust in whoever controls the environment.

 

Separation between storage and protection

The system storing the data should not automatically be the system that can read the data.

 

 

 

What RED does

RED is designed to let organizations:

 

  • protect sensitive data before it is stored

  • reduce default plaintext exposure across infrastructure

  • keep encryption control separate from the storage provider

  • enforce access through cryptographic authorization

  • manage internal and external sharing under stronger control boundaries

  • apply policy-based protection to sensitive workflows

  • maintain auditability and governance around access and data handling

  • support controlled processing and external system interaction without default broad exposure

  • deploy across supported environments without forcing infrastructure replacement

 

 

The result is a stronger protection model for modern enterprise data handling.

 

 

 

How RED protects data

RED is built around a zero-knowledge architecture.

 

Sensitive data is encrypted locally before storage. Encryption is designed to happen before the data becomes dependent on the storage environment for protection. This means the protection model begins before the storage provider, backend environment, or infrastructure administrator would otherwise become the default trust boundary.

 

At a high level, RED uses:

 

  • client-side encryption before storage

  • AES-256-GCM encryption

  • unique random IVs per chunk

  • per-document data encryption keys rather than one broad shared key

  • wrapped-key architecture for stronger key separation

  • controlled key release flows for authorized access

  • explicit authorization boundaries around decryption-related operations

 

 

This is designed to create a much stronger model than environments where the server, storage provider, or broad internal platform roles can access plaintext by default.

 

The objective is straightforward:

 

control over infrastructure should not automatically mean control over sensitive data.

 

 

Core technical architecture

RED’s protection model is built around layered cryptographic controls rather than a single shared trust point.

 

 

Client-side encryption

Sensitive data is encrypted on the client side before storage. This is intended to reduce the risk created when plaintext becomes visible inside storage, provider, or general backend environments.

AES-256-GCM

RED uses AES-256-GCM as the primary encryption primitive for protected data.

 

 

Per-document DEKs

RED uses distinct data encryption keys for documents rather than one broad key covering everything. This improves blast-radius control and makes the protection model more granular.

 

 

Wrapped key architecture

Data encryption keys are wrapped through higher-order key control logic rather than left exposed as broad reusable secrets. This separation is a core part of RED’s architecture.

 

 

Key derivation and authorization model

RED’s architecture is built around cryptographic authorization and derived key control, rather than simple password-based trust or broad server-side decryption privilege.

 

 

Controlled key release

Decryption-related access is designed to occur through controlled key-release paths rather than through unrestricted backend access patterns. That allows access to be bounded, authorized, and enforced under the protection model.

 

 

Storage and protection separation

Storage is treated as infrastructure. Protection is treated as a separate security layer. That separation is fundamental to RED.

 

 

 

Why this model matters

In a traditional architecture, organizations often end up trusting that:

 

  • the provider behaves correctly

  • administrators behave correctly

  • privileged services are never abused

  • backend logic never overreaches

  • exposed environments remain clean

  • third-party systems only use what they are meant to use

 

 

That may be operationally necessary in parts of the stack, but it is a weak foundation for highly sensitive data.

 

RED is designed to reduce how much the organization must rely on those assumptions for plaintext protection itself.

 

That is why RED is different.

 

It is not only about encrypting files. It is about building a system where the protection boundary is more closely tied to the data and the authorization model than to broad infrastructure control.

 

 

 

Access, sharing, and control

In most systems, access control is still mostly administrative.

 

A user gets a role. A service gets a permission. An internal system gets broad access. A database policy says yes. A backend function runs with elevated authority. The result is often that many more things can see the data than the business actually intends.

 

RED is designed to make access control stronger by tying it to the protection model itself.

 

When access is granted, it is meant to be granted explicitly.

 

When access is revoked, the boundary is not intended to be only a UI setting or an administrative checkbox. It is meant to be enforced through the same protection model that secures the data.

 

This is important for:

 

  • internal sharing

  • external sharing

  • partner access

  • vendor interaction

  • controlled review workflows

  • sensitive business collaboration

  • regulated data handling

  • high-trust organizational environments

 

 

The real question is not only who is supposed to have access.

 

The real question is:

 

what technically prevents everyone else from having it?

 

RED is built to answer that question properly.

 

 

 

Internal and external sharing

RED is designed to support secure sharing across different operational realities.

 

That includes:

 

  • sharing within teams

  • sharing across departments

  • sharing between administrators and members under controlled boundaries

  • sharing with external partners

  • sharing with processors or controlled third-party environments

  • revocation-sensitive access patterns

 

 

The goal is not casual file sharing. The goal is to support sharing without collapsing back into a broad-trust model where the system, provider, or general admin layer can read everything by default.

 

 

 

Controlled processing workflows

Modern organizations do not only store data. They move it through workflows.

 

Sensitive data may need to be:

 

  • reviewed

  • approved

  • passed across internal roles

  • handled by external processors

  • used in automation

  • involved in AI workflows

  • processed under policy conditions

  • accessed in temporary or bounded ways

 

 

RED is designed to support this through controlled access paths rather than permanent broad visibility.

 

That matters because modern data protection is not only about storage. It is about governing how sensitive data is accessed and used across live business operations.

 

AI, automation, analytics, and external systems

This is one of the most important parts of RED.

 

Organizations increasingly want to use:

 

  • AI tools

  • automation platforms

  • analytics systems

  • external processors

  • workflow engines

  • vendor environments

 

 

At the same time, many of them are handling regulated, confidential, strategic, or operationally sensitive data.

 

That creates a major contradiction.

 

The business wants faster workflows and more intelligence. The security reality is that every additional system that touches sensitive data expands risk.

 

RED is designed to help resolve that contradiction by supporting a more controlled interaction model.

 

Instead of assuming that operational use requires broad plaintext exposure, RED is built to support stronger authorization boundaries around how protected data is accessed and processed.

 

For organizations adopting AI or automation in security-sensitive or regulated environments, this is not optional window dressing. It is becoming a fundamental requirement.

 

The future question is not whether organizations will use AI.

 

It is:

 

under what protection model they will allow AI and external systems to interact with sensitive data at all.

 

RED is built for that future.

 

 

 

RED and existing infrastructure

RED is not designed to force migration.

 

Organizations should not have to abandon their cloud provider, rebuild their storage strategy, or redesign their core systems just to apply stronger data protection.

 

RED is designed to operate above supported environments.

 

That means organizations can strengthen protection while continuing to use existing infrastructure.

 

This matters:

 

Operationally

because full replacement is disruptive

 

Financially

because forced migration is expensive

 

Strategically

because security adoption is faster when it works with real environments

 

RED is built to improve protection without demanding unnecessary architectural disruption.

 

 

 

BYOS: Bring Your Own Storage

RED supports a bring-your-own-storage model for organizations that want to keep storage under their own infrastructure control.

 

This is especially important for enterprises, governments, regulated environments, and organizations with strict data governance requirements.

 

With BYOS, RED’s protection layer can operate while the organization retains control over where protected data objects are stored.

 

Supported storage environments include:

 

  • AWS S3

  • Google Cloud Storage

  • Microsoft Azure Storage

  • Oracle Cloud storage environments

  • MinIO and compatible object storage environments

 

 

This gives organizations flexibility to align RED with their own infrastructure, cloud policy, procurement model, jurisdictional requirements, or operational standards.

 

BYOS matters because many serious buyers do not want a security vendor to force them into one storage dependency model. They want stronger protection while preserving infrastructure choice.

 

RED is built to support that.

 

 

 

Managed storage options

For organizations that prefer not to bring their own storage immediately, RED can also support managed storage models.

 

This gives buyers flexibility based on maturity, internal capacity, procurement timing, or deployment preference.

 

That means organizations can choose the model that fits them best:

 

  • use their own storage infrastructure

  • start with managed storage

  • align storage strategy with the pace of internal adoption

 

 

This is important commercially and operationally because not every buyer wants the same deployment path.

 

Some want full infrastructure control from day one.

Some want a faster adoption path.

RED is designed to support real-world flexibility.

 

 

 

Storage philosophy

RED should be understood correctly here:

 

RED is not fundamentally a storage replacement product.

 

RED is a protection layer that works with storage.

 

That distinction matters.

 

Storage answers where data lives.

RED answers how that data remains protected, how access is controlled, and how exposure is reduced.

 

That separation is one of the reasons RED is structurally stronger than ordinary “secure storage” positioning.

 

 

 

Deployment flexibility

RED is designed for different organizational realities.

 

Deployment and operational models may vary depending on:

 

  • infrastructure ownership preferences

  • storage requirements

  • governance obligations

  • internal security policy

  • procurement constraints

  • scale requirements

  • integration path

 

 

RED is built to support deployment across supported environments without reducing the protection model to a generic one-size-fits-all SaaS trust structure.

 

This is important for:

 

  • enterprises

  • regulated industries

  • government-related environments

  • organizations with strict data locality concerns

  • teams with custom cloud or object-storage standards

  • buyers who require deeper control over infrastructure decisions

 

 

 

 

Governance, auditability, and accountability

Serious organizations need more than encryption.

 

They need to answer questions like:

 

  • who had access

  • who granted access

  • when access occurred

  • under what conditions access was allowed

  • how protected data moved

  • how policy was applied

  • what actions were taken

  • how the system can support accountability

 

 

RED is designed to support those needs through structured governance and audit-oriented controls.

 

This includes support for:

 

  • audit visibility

  • event tracking

  • access accountability

  • policy-aware control models

  • governance-oriented operational administration

 

 

RED is built for environments where protection must stand up not only technically, but also operationally and organizationally.

 

That makes it relevant not only to engineers, but also to:

 

  • security leadership

  • legal teams

  • procurement stakeholders

  • compliance functions

  • risk managers

  • executive decision-makers

 

 

 

 

Tamper-evident audit model

RED is built with a serious view of audit integrity.

 

Audit should not just exist as a convenience log. It should support stronger trust in what was recorded and how events can be verified.

 

RED’s architecture includes tamper-evident audit concepts designed to strengthen the reliability of security-relevant event history and make auditability more defensible in serious environments.

 

For organizations that care about accountability, this matters.

 

A weak audit model can say something happened.

A stronger audit model helps defend the integrity of that record.

 

 

 

Policy-based security model

RED is designed to support policy-driven protection rather than relying only on static permissions.

 

That matters because sensitive environments are rarely governed well by simple role assignments alone.

 

Organizations often need conditions around:

 

  • who can access what

  • in what context

  • under what policy

  • for what type of workflow

  • with what type of authorization

  • with what degree of restriction or auditability

 

 

RED is designed to support a stronger policy-aware access model for serious environments.

 

 

 

Enterprise operating model

RED is built for real organizational complexity.

 

That includes support for environments where data is handled across:

 

  • multiple users

  • multiple teams

  • internal administrative roles

  • external parties

  • varying sensitivity levels

  • different operational workflows

  • cloud and object storage environments

  • audit and governance expectations

 

 

It is built to give organizations stronger command over how protected data is stored, shared, accessed, governed, and processed.

 

The objective is not simply to encrypt objects.

 

The objective is to improve the operating model around sensitive data itself.

 

 

 

Zero-knowledge means something specific here

RED’s zero-knowledge model is not cosmetic language.

 

It means the architecture is designed so that plaintext access is not meant to be available by default to the platform, storage provider, or general backend environment simply because they are involved in storage or control flow.

 

That is a major distinction.

 

Many products claim strong security while still depending heavily on trusted server visibility, broad backend decryption capability, or provider-side trust for normal operation.

 

RED is built to reduce that dependence.

 

That is the difference between “we secure your data” as a marketing statement and a system that is architected to reduce who can actually see the data at all.

 

 

 

What makes RED different

RED is different because it starts from a stronger assumption:

 

the system storing or managing the data should not automatically be the system that can see the data.

 

That leads to a different architecture and a different operational model.

 

RED is not:

 

  • just another cloud storage vendor

  • just another collaboration platform

  • just another encryption checkbox

  • just another admin-trust model

  • just another backend-visible system dressed up as security

 

 

RED is built around:

 

  • protection before storage

  • separation between storage and protection

  • explicit cryptographic access control

  • reduced default plaintext exposure

  • infrastructure flexibility

  • stronger alignment with enterprise governance needs

  • controlled interaction with modern workflows, external systems, and AI environments

 

 

This is not a cosmetic improvement to old models.

 

It is a different model.

 

 

 

Who RED is for

RED is built for organizations and environments where ordinary trust assumptions are not good enough.

 

That includes situations where sensitive data is:

 

  • confidential

  • business-critical

  • operationally sensitive

  • legally sensitive

  • regulated

  • shared across multiple parties

  • processed across different systems

  • handled by vendors or external processors

  • involved in automation or AI workflows

 

 

RED is for organizations that understand a simple fact:

 

if sensitive data can become visible too easily inside the system, then the system is weaker than it looks.

 

 

 

What RED gives organizations

RED is designed to give organizations:

 

 

Stronger control

Access is intended to be explicit and cryptographically bounded rather than broadly assumed through infrastructure trust.

 

 

Lower exposure

Plaintext is not meant to become broadly visible across the platform and storage layers by default.

 

 

Better separation of concerns

Storage and protection are treated as distinct concerns rather than collapsed into one trust layer.

 

 

More flexible infrastructure choices

Organizations can align RED with supported cloud and object storage environments instead of being forced into a single provider path.

 

 

Stronger audit and governance posture

Protection is supported by accountability, visibility, policy enforcement, and operational control expectations relevant to serious buyers.

 

 

Better alignment with modern workflows

RED is built for environments where data moves across teams, systems, vendors, automation, and external processing paths.

 

 

 

The core idea behind RED

At its core, RED is built on a simple belief:

 

sensitive data should remain protected even when it moves.

 

Not only when it sits in one trusted environment.

Not only when the provider behaves correctly.

Not only when the admin layer is assumed to be safe.

Not only when no external system touches it.

 

Sensitive data should remain protected across modern operating reality.

 

That is what RED is built for.

 

 

 

Conclusion

RED is Rhea’s zero-knowledge data protection platform.

 

It is designed to protect sensitive data before storage, reduce unnecessary plaintext exposure, keep access under explicit cryptographic control, support stronger governance and auditability, and operate across supported infrastructure without forcing storage or cloud replacement.

 

It is built for organizations that need stronger control over how sensitive data is protected, accessed, shared, processed, and governed across clouds, systems, teams, vendors, and external environments.

 

RED exists for organizations that need more than trusted infrastructure.

 

RED exists for organizations that need protection to remain intact even when data moves.

 

 

 

RHEA_E9 uj.png

2026 Rhea. All rights reserved.

bottom of page