TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Current Secrets Rotation Process Is Broken

68 点作者 tompic823超过 2 年前

6 条评论

hbrn超过 2 年前
What&#x27;s sad is that despite it&#x27;s current state, secret management has still managed to turn into a cargo cult. It&#x27;s a &quot;best practice&quot; that people blindly implement without thinking.<p>But secrets are next to useless if they are:<p>- not used to limit number of people that have access to them (it is quite typical in small teams to give everybody access to production, which essentially gives you access to keys)<p>- not regularly rotated (at the very least when a person that had access to them leaves the company)<p>And rotation is hard: a lot of systems still don&#x27;t support multiple keys, so rotation has to be very carefully tied to some form of blue-green deployment, which is often not possible.
评论 #34445755 未加载
评论 #34445153 未加载
评论 #34445483 未加载
评论 #34445955 未加载
评论 #34445808 未加载
jiggawatts超过 2 年前
The &quot;better way&quot; for me has been managed identities in Azure. These are Azure Active Directory service principals, which are similar to Group-Managed Service Accounts (gMSA) in Active Directory. They&#x27;re essentially a platform-managed identity with automatically rotating secrets that the developers never need to know, and sysops don&#x27;t have to deal with. They can be assigned to VMs or various PaaS services, and then service-to-service access is via standard Azure RBAC, with auditing and everything.<p>There is nothing to rotate, nothing to put into a &quot;key vault&quot;, nothing to worry about leaking out, nothing that could accidentally get pasted into Git, and nothing on that developers&#x27; laptop that he left at the airport. You literally say: &quot;I want service A to have read access to service B&quot;, and you&#x27;re done.<p>Visual Studio automatically injects the developer&#x27;s personal identity into processes, so that they can access cloud resources during local development, so that&#x27;s covered too. (For Linux developers, the Azure Identity SDK can pick up the user credentials via the &quot;az&quot; cli.)<p>&quot;Making fire with stones to avoid a proprietary lighter.&quot; -- &#x2F;user?id=pjmlp
评论 #34451267 未加载
nixpulvis超过 2 年前
The fact that we don&#x27;t have a well adopted standard for password management, critically including password rotation and key sharing, by now is both surprising and infuriating.
javajosh超过 2 年前
Are there any widely available, published threat models for secret management of this sort? It seems to me that if you want to frame the discussion in a useful way, you&#x27;d start there. Then you can point out where current practice works, where it doesn&#x27;t, and how your solution works better.
msolberg超过 2 年前
HashiCorp vault is a pretty good answer. It has plugins to auto rotate a number of different connections, works with both static and dynamicly created users, whole host of auditing optinons.
yodon超过 2 年前
Doppler looks interesting - are there other companies in this space doing good work?