Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secrets management in GitOps workflow #61

Closed
mmorejon opened this issue Nov 20, 2020 · 2 comments
Closed

Secrets management in GitOps workflow #61

mmorejon opened this issue Nov 20, 2020 · 2 comments

Comments

@mmorejon
Copy link

The management of sensitive information and its storage in version control systems such as Git involves additional complexity to avoid this data being in plain text.

Currently there are multiple systems whose mission is to cover this need, but the decision is not easy, there are differences depending on the platform used, storage costs, disaster recovery techniques, among other elements. I think it would be interesting and timely to identify how teams should approach this issue, such as:

  • what characteristics the system used must meet
  • how to automate the generation of secret objects in code repositories
  • where the encryption keys used should be stored
  • object renewal techniques when changing the encryption key
  • techniques or recommendations to remove sensitive information in plain text from version control
@o6uoq
Copy link

o6uoq commented Nov 23, 2020

+1 for the above and any patterns/best practice vis-a-vis the likes of SOPS, HashiCorp Vault, etc.

@bricef bricef transferred this issue from another repository Jan 8, 2021
@scottrigby scottrigby transferred this issue from gitops-working-group/gitops-working-group Jan 17, 2022
@roberthstrand
Copy link
Member

This topic will be covered by the @open-gitops/gitops-security content subgroup. If anyone wants to join and help, check out issue #128 to volunteer.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants