Digital Ocean ENV Variables – .env file, ENV Variables, or something else

Does Digital Ocean have something similar to Credstash or AWS Secrets Manager (both AWS services)?

Trying to decide on the most secure way to store environmental variables with sensitive information (like database access codes, for exampl… Continue reading Digital Ocean ENV Variables – .env file, ENV Variables, or something else

Can passing credentials as parameters to CloudFormation templates via a build script be secure?

I have a CloudFormation stack that currently resolves credentials from the AWS Systems Manager parameter store.

I’d like to change how it gets credentials.

Now I would like to:

Use the Python requests library to make a get request for … Continue reading Can passing credentials as parameters to CloudFormation templates via a build script be secure?

Getting data from AWS Secrets Manager at deployment (ENV variables) vs. at run-time (e.g. aws-sdk)

Given a serverless deployment of some kind (i.e. something that relies on AWS Lambda for computing), and secrets stored in AWS Secrets Manager, what difference from security standpoint is there between the following two options:

reading … Continue reading Getting data from AWS Secrets Manager at deployment (ENV variables) vs. at run-time (e.g. aws-sdk)

Handling secrets and environmental variables in Docker-k8s-skaffold dev environment

Basically, trying to wrap my brain around how I should be handling secrets using Docker, k8s, and Skaffold in a dev environment. I’m pretty new to this tech, so don’t fully understand all of it.

Just not sure if I should be … Continue reading Handling secrets and environmental variables in Docker-k8s-skaffold dev environment

Securing Code Secrets – What is the relevance if the host gets compromised?

I’ve been researching and testing different approaches when it comes to securing code secrets, and am unsure what the best options are, and if they even have any relevance once a host gets compromised.

Some standard approac… Continue reading Securing Code Secrets – What is the relevance if the host gets compromised?