Storage Backends
Available Backends
| Backend | Status | E2E Encrypted | External Tool Access |
|---|---|---|---|
| ev (default) | Available | Yes | No |
| AWS Secrets Manager | Available | No | Yes |
| HashiCorp Vault | Available | No | Yes |
| GCP Secret Manager | Available | No | Yes |
| 1Password | Available | No | Yes |
How It Works
Regardless of backend, ev always stores release metadata (timestamps, authors, history) in its own Postgres database. Only secret values are stored in the external backend.
When using an external backend like AWS Secrets Manager, values are stored as plaintext in that system — the same as your existing setup. ev adds team sync, diff, history, promotion, and rollback on top.
Choosing a Backend
Use the ev backend when:
- You want full end-to-end encryption
- You do not need your existing infra tools (Terraform, ECS, Lambda) to read secrets natively
- You are starting a new project
Use AWS Secrets Manager when:
- Your existing Terraform, ECS task definitions, or Lambda functions already read from AWS SM
- You want ev to add team workflow on top of your existing secret storage
- E2E encryption is less important than infrastructure compatibility
Configuration Example
Limitations
| Feature | ev backend | AWS SM | Vault | GCP SM | 1Password |
|---|---|---|---|---|---|
| push / pull / diff / log | Yes | Yes | Yes | Yes | Yes |
| promote | Yes | Yes | Yes | Yes | Yes |
| rollback | Yes | No | No | No | No |
| E2E encryption | Yes | No | No | No | No |
| External tool reads | No | Yes | Yes | Yes | Yes |