Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Secrets belong wherever it makes the most sense for them to be, balancing operational needs, security, and compliance requirements.

Storing secrets in version control (with permissions to the repo tightly controlled), encrypted (with the decryption key only available on the compute needing secret access), and used for rendering into a discovery mechanism (or directly injected into instance env vars) is entirely legitimate (and I know of several orgs doing this).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: