|
You are here |
blog.gitguardian.com | ||
| | | | |
malgregator.com
|
|
| | | | | Lessons learned from the multi year operation of the HashiCorp Vault Open Source deployment. | |
| | | | |
devopsian.net
|
|
| | | | | Secrets management refers to the tools and methods for managing digital authentication credentials (secrets), including passwords, keys, APIs, and tokens for use in applications, services, privileged accounts, and other sensitive parts of the IT ecosystem. While secrets management is applicable across an entire enterprise, the terms secrets and secrets management are referred to more commonly in IT about DevOps environments, tools, and processes. "Three may keep a secret, if two of them are dead. | |
| | | | |
www.sethvargo.com
|
|
| | | | | Serverless applications and cloud functions often need to communicate with an upstream API or service. This post describes common patterns and approaches for managing secrets in serverless such as encrypted environment variables, IAM, and Google Cloud Storage. | |
| | | | |
snapcraft.io
|
|
| | | Virtualisation plays a huge role in almost all of today's fastest-growing software-based industries. It is the foundation for most cloud computing, the go-to methodology for cross-platform development, and has made its way all the way to 'the edge'; the eponymous IoT. This article is the first in a series where we explain what virtualisat [...] | ||