BrandKwikID Documentation

Architecture

Design, technical specifications, and deployment model for the Aadhaar Data Vault

Architecture and Technical Design

Here you’ll find the design, tech specs, and deployment model for the Aadhaar Data Vault on your AWS cloud.

Overview

The vault is a dedicated, secure system that holds the only copy of Aadhaar numbers (and linked data) in your organization. Everything else refers to Aadhaar only by Reference Keys; the mapping lives inside the vault.

Technical Specifications

We use these crypto and security standards, in line with UIDAI and common practice:

ComponentSpecificationPurpose
Public key encryptionRSA 2048Key exchange and digital signatures for vault operations
Symmetric encryptionAES 256Encryption of Aadhaar numbers and connected data at rest
Key storageHSM onlyEncryption keys are stored in Hardware Security Module (HSM) devices only, as mandated by UIDAI
Reference KeyUUID (e.g. hex)Non-reversible: you can’t derive the Aadhaar from the key alone

High-Level Architecture

Business systems and DBs hold only Reference Keys; the vault holds the mapping and encrypted Aadhaar data.

Deployment Model

  • Cloud: AWS (your account).
  • Network isolation: The vault and its APIs sit in a locked-down network zone, separate from the internet and other internal zones. Only trusted traffic is allowed in and out.
  • Access: You talk to the vault through an API or microservice that handles mapping and access control. App-level checks decide who can call it.
  • Single logical instance: Aadhaar (and eKYC/cKYC XML where needed) lives in one logical vault with its reference keys. HA/DR can be added with the same security as the main vault.

Data Flow (Simplified)

  1. Ingestion: When you receive an Aadhaar (or eKYC/cKYC data), you send it to the vault API. The vault creates a Reference Key, stores the encrypted data, and returns the key.
  2. Usage: Your systems store and use only the Reference Key. They never store the actual Aadhaar.
  3. Retrieval: When you need the real Aadhaar (e.g. for authentication), an authorized system calls the vault with the Reference Key. The vault decrypts and returns it only to authorized, logged requests.

Benefits

  • Clear boundary: Aadhaar in one place; Reference Keys everywhere else.
  • Regulatory fit: Matches UIDAI’s idea of a dedicated vault with restricted, secure access.
  • Auditability: All vault access can be logged and monitored.

Next Steps