Skip to content

Latest commit

 

History

History
25 lines (16 loc) · 1.15 KB

File metadata and controls

25 lines (16 loc) · 1.15 KB

Secure Configuration

Description

The most straightforward solution for secure configuration is decoding encrypted information within the application itself.

There are better, more transparent ways to do this on Kubernetes. The support for secure configuration on Kubernetes falls roughly into two categories:

Out-of-cluster encryption This stores encrypted configuration information outside of Kubernetes, which non-authorized persons can also read. The transformation into Kubernetes Secrets happens just before entering the cluster (e.g., when applying a resource via the API server) or inside the cluster by a permanently running operator process.

Practical approaches are: Sealed Secrets (via Bitnami) and External Secrets (via External Secrets Operator)

Centralized secret management This uses specialized services that are either already offered by cloud providers (e.g., AWS Secrets Manager) or are part of an in-house vault service (e.g., HashiCorp Vault) for storing confidential configuration data.

References

[1] External Secrets Operator

[2] Bitnami