Hacker News new | past | comments | ask | show | jobs | submit login

It's a security stance. Without rotating the secrets automatically, it becomes more likely that somebody will share a secret.

During a breach, if each service gets their own secrets, it becomes easier to trace the entrypoints and which secret go compromised. Once the system is closed again the attacker automatically looses access to everything after 4h.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: