TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How are you accessing/caching frequently used secrets?

5 pointsby robszumskiover 2 years ago
What does your access control look like? Once fetched or decrypted, do you protect them in-use? Does frequent access change how you do audit logging? Do you have per-customer encryption keys?

1 comment

vba616over 2 years ago
I'm not sure if this has anything to do with what you're asking about, but I've been wondering if anyone uses the built in to Windows "Credential Manager" and best practices around it.