Encryption


dbWatch Control Center applies strong encryption practices to ensure secure communication between all components within a Control Center domain, including servers, monitor nodes, and clients.


End-to-End Encrypted Communication

All network traffic exchanged between dbWatch server nodes and monitor clients is end-to-end encrypted using:

The use of AES-GCM provides high-performance encryption while also embedding verification to prevent tampering.


Node Certificate-Based Encryption

Encryption keys are derived from certificates issued by the domain’s internal Certificate Authority (CA), which are managed through the dbWatch certificate infrastructure.

Each communication session:

Read more about the certificate infrastructure:
Certificate Infrastructure


Certificate-Based Signing and Ephemeral Keys

To ensure strong identity and message integrity, dbWatch uses digital signatures and temporary session keys:

You can view certificate rotation in real time via:


Debugging and Verifying Encryption

You can verify encryption details during an active session via:

This window shows:


Protocol Summary

Layer Mechanism
TLS transport AES/GCM with 256-bit symmetric keys
Key exchange Elliptic-curve Diffie-Hellman
Signing SHA256withECDSA
Certificate rotation Every 10 minutes (ephemeral certs)

Security Recommendations


Related Topics


For questions regarding encryption standards or enabling advanced cryptographic settings, contact:
support@dbwatch.com