John Montroy

We start with a couple of desirable secrets properties for applications:

What are our options for getting a secret into a container? Here we evaluate each in turn:

Kubernetes Secrets meet our criteria:

Most places (including all places I’ve worked) end up using things like AWS KMS, Vault, etc. They allow multi-cluster sharing, rotation, independent editing, etc.

Lastly, as always - if you have root on a host machine, you can see everything, including secrets. Mounts are visible via mount -t tmpfs and env vars are under /proc//environ.

#Container-Security