by plurby on 7/11/24, 11:09 PM with 66 comments
by WatchDog on 7/12/24, 4:14 AM
Seems like kinda a niche threat model, if your app is already compromised to the point where it's secret cache can be read, it seems likely that the attacker could also pivot to just read from the cache, or use the instance credentials to read from secrets manager itself.
by derefr on 7/12/24, 4:40 PM
• AWS secrets, GCP secrets, Azure secrets... each has its own API
• secrets in a HashiCorp Vault install
• secrets from whatever cloud password manager
• "ambient" secrets from env-vars, or the local .netrc, or the local macOS Keychain
• k8s Secrets resources (when you're a k8s CRD controller)
• secrets stored in SOPS files, in turn encrypted by keys held in any of the above
Why haven't we seen a generic "secrets client" library, with pluggable adapters for handling all of these cases through the same library API / CLI tooling?
Or better yet, why not a generic stub secrets client, that speaks to an also-generic "caching middleware proxy" like this AWS one — where the proxy has the pluggable backend adapters + connection config for them?
by slaughtr on 7/12/24, 3:29 AM
What are the advantages to a configuration like this? Seems the HTTP interface with non-encrypted cache and separate agent situation isn’t something secure enough to satisfy most companies these days.
by thedougd on 7/12/24, 2:46 PM
https://github.com/chrissav/consul-template-plugin-secretsma...
I didn't realize consul-template supported plugins.
by SunnyW on 7/13/24, 7:43 PM
Another consideration is operation; imagine that there are 10 different libraries maintained for this purpose, and if there is a new feature, say, you need all logs going to one place, making sure it is available in all languages would require a team with different programming skills to do so. Secrets agent, being language agnostic, you only need to change at one place, and someone else may have already done it for it or ready to do it, as it is open source project.
When it comes to cost saving, imagine scenarios where a junior developer improperly implements secret retrieval in a Lambda function, with retrieval occurring at every function invocation and each function handling 100 transactions per second. Such a single oversight can cost $1,000 a month, and if left unnoticed for a year—a common occurrence when the function appears to work—people often overlook further scrutiny as long as it functions.
by wrs on 7/12/24, 6:00 AM
https://aws.amazon.com/blogs/compute/using-the-aws-parameter...
by perryizgr8 on 7/12/24, 12:07 PM
by micahbule on 7/12/24, 12:26 PM
by lijok on 7/12/24, 9:46 AM
Moved all our secrets to S3 a long time ago and haven't looked back.
by 420official on 7/12/24, 3:43 AM
by webprofusion on 7/12/24, 7:47 AM
by symlinkk on 7/12/24, 4:45 PM
by gtirloni on 7/12/24, 2:28 PM
by Sparkyte on 7/12/24, 8:20 AM
by shironandonon_ on 7/12/24, 5:04 PM