Data protection
IronClad Vault
Megakey Vault OperationsSensitive files should stay encrypted until an authorized user truly needs them.
A zero-trust secure storage system for sensitive IP, legal, healthcare, and enterprise documents with classification levels and emergency Megakey recovery.
Plain English
IronClad Vault stores files locally with AES-256-GCM, Argon2id, a 1MB Megakey recovery file, role-based clearance, and Sentinel mode for remote client access.
What it teaches
- local-first storage
- classification discipline
- Megakey recovery
- role-based access control
Use when
- You need encrypted local storage
- Users need clearance-based file access
- A server or NAS needs headless Sentinel operation
- Admins need emergency recovery with a physical Megakey
What it observes
- Vault file metadata
- User roles and clearance levels
- Sentinel unlock state
- Remote client sessions
Requirements
- Megakey file must be saved outside the vault machine
- TCP 9000 for Sentinel remote client access
- Port 8443 HTTPS for API mode where used
- Windows firewall rules for Sentinel access
Manual-backed details
- Encryption uses AES-256-GCM with Argon2id and a 1MB recovery_megakey.bin file.
- Clearance levels are Public 1, Internal 5, Secret 7, and Top Secret 10.
- Sentinel mode holds the master key in RAM only and locks again when closed or rebooted.
Next step
Create the admin account, store recovery_megakey.bin offline, classify imported files, and test recovery before relying on the vault.
