TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Security of Infrastructure Secrets

58 pointsby smurfpandeyabout 10 years ago

5 comments

kgilpinabout 10 years ago
Disclaimer: infrastructure secrets management is my profession.<p>This is a lot harder problem than people realize.<p>If you have a fixed set of machines that need secrets, then encrypting a bag of secrets with each machine&#x27;s private key works ok.<p>But in auto scaling &#x2F; automated &#x2F; ephemeral scenarios, it doesn&#x27;t work. You need an RBAC scheme for machines that builds layers of trust; each machine is placed into a role by a trusted service, script or person. Communication between the machines and the secrets service is verified TLS. Each event of access to, or modification of, a secret is recorded for audit purposes. And people and machines should both be treated as first-class actors.<p>Furthermore, secrets should be kept off permanent media; per the 12factor guidelines, secrets should come from environment variables.<p>Don&#x27;t entangle secrets management with other tools like configuration management; otherwise you impede yourself from switching architectures down the road.<p>Don&#x27;t create workflows that only ops can control, leaving developers out in the cold, or you are increasing organizational friction.<p>And if your secrets management processes are opaque to security and compliance people, then they won&#x27;t have the same level of trust that they would have in a transparent system.<p>Here&#x27;s an example of how we approach the problem: <a href="http://blog.conjur.net/chef-cookbook-uploads-with-conjur" rel="nofollow">http:&#x2F;&#x2F;blog.conjur.net&#x2F;chef-cookbook-uploads-with-conjur</a>
评论 #9274093 未加载
评论 #9275664 未加载
评论 #9274771 未加载
sjbaseabout 10 years ago
Storing secrets is fundamentally imperfect (&quot;it&#x27;s not a secret if someone [or something] else knows it&quot;). This article calls for aid in the form of standards other than PCI-DSS, and those standards do actually exist. NIST 800-53 and 800-130 to name a couple; the EU has others in different industry flavors.<p>Now, I&#x27;m not going to defend these govt. standards as up-to-date or comprehensive. But they&#x27;re a good philosophical reference for how to manage keys&#x2F;secrets. Some COTS technologies (which I won&#x27;t advertise here) try to automate&#x2F;enforce strong key management for infra, but are typically only affordable for enterprise deployments.
评论 #9274164 未加载
proksoupabout 10 years ago
The attack vectors that surprised me but should not have:<p>- MongoHQ support person has access to data in customer database.<p>- CircleCI stores <i>everything</i> in the MongoHQ database, that is used to deploy&#x2F;control customer servers.<p>- CircleCI&#x27;s Customers&#x27; CircleCI controlled environments mixed with production environments.<p>I am guessing everyone just expects most companies, especially those with maybe just Series A financing or close to it, expects those companies to employ this level of security paranoia?
评论 #9274318 未加载
评论 #9274478 未加载
jffryabout 10 years ago
Needs a [2013] tag. I thought they had been compromised again.
cddotdotslashabout 10 years ago
The link to the MongoHQ page about their compromise is giving a cert expired error (1 day ago), which then redirects to a page not found on compose.io. Odd.