Skip to main content

Secret Management

Secure storage, rotation, and delivery of secrets (API keys, database credentials, TLS certificates) for applications and infrastructure using HashiCorp Vault, cloud providers, and Kubernetes.

When to Use

Use when:

  • Storing API keys, database credentials, or encryption keys
  • Implementing secret rotation (manual or automatic)
  • Syncing secrets from external stores to Kubernetes
  • Setting up dynamic secrets (database, cloud providers)
  • Scanning code for leaked secrets
  • Implementing zero-knowledge patterns
  • Meeting compliance requirements (SOC 2, ISO 27001, PCI DSS)

Key Features

Static vs. Dynamic Secrets

Secret TypeUse Dynamic?TTLSolution
Database credentialsYES1 hourVault DB engine
Cloud IAM (AWS/GCP)YES15 minVault cloud engine
SSH/RDP accessYES5 minVault SSH engine
TLS certificatesYES24 hoursVault PKI / cert-manager
Third-party API keysNOQuarterlyVault KV v2 (manual rotation)

Kubernetes Secret Delivery

MethodUse CaseRotationRestart Required
External Secrets OperatorStatic secrets, periodic syncPolling (1h)Yes
Secrets Store CSI DriverFile-based, watch rotationinotifyNo
Vault Secrets OperatorVault-specific, dynamicAutomatic renewalOptional

Quick Start

HashiCorp Vault: Static Secrets (KV v2)

# Create secret
vault kv put secret/myapp/config api_key=sk_live_EXAMPLE

# Read secret
vault kv get secret/myapp/config

# List versions
vault kv metadata get secret/myapp/config

Vault: Dynamic Database Credentials

# Configure PostgreSQL
vault write database/config/postgres \
plugin_name=postgresql-database-plugin \
connection_url="postgresql://{{username}}:{{password}}@postgres:5432/mydb"

# Create role
vault write database/roles/app-role \
db_name=postgres \
creation_statements="CREATE ROLE \"{{name}}\"..." \
default_ttl="1h"

# Generate credentials (auto-rotated)
vault read database/creds/app-role

Kubernetes: External Secrets Operator (ESO)

apiVersion: external-secrets.io/v1beta1
kind: SecretStore
metadata:
name: vault-backend
spec:
provider:
vault:
server: "https://vault.example.com"
auth:
kubernetes:
role: "app-role"
---
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: database-credentials
spec:
refreshInterval: 1h
secretStoreRef:
name: vault-backend
target:
name: db-credentials
data:
- secretKey: password
remoteRef:
key: secret/data/database/config

Python: Vault Integration (hvac)

import hvac

client = hvac.Client(url='https://vault.example.com')
client.auth.kubernetes(role='app-role', jwt=jwt)

# Fetch dynamic credentials
response = client.secrets.database.generate_credentials(name='postgres-role')
username = response['data']['username']
password = response['data']['password']

Decision Frameworks

Choosing a Secret Store

ScenarioPrimary ChoiceAlternative
Kubernetes + Multi-CloudVault + ESOCloud Secret Manager + ESO
Kubernetes + Single CloudCloud Secret Manager + ESOVault + ESO
Serverless (AWS Lambda)AWS Secrets ManagerAWS Parameter Store
Multi-Cloud EnterpriseHashiCorp VaultDoppler (SaaS)
Small Team (<10 apps)Doppler, Infisical1Password Secrets Automation
GitOps-CentricSOPS (git-encrypted)Sealed Secrets (K8s-only)

Decision Tree:

  • Kubernetes? → External Secrets Operator (ESO) with chosen backend
  • Single cloud? → Cloud-native (AWS/GCP/Azure)
  • Multi-cloud/on-prem? → HashiCorp Vault
  • GitOps? → SOPS or Sealed Secrets

Secret Rotation Patterns

Pattern 1: Versioned Static Secrets (Blue/Green)

  1. Create new secret version in Vault
  2. Update staging environment
  3. Monitor for errors (24-48 hours)
  4. Gradual production rollout (10% → 50% → 100%)
  5. Revoke old secret (after 7 days)

Pattern 2: Dynamic Database Credentials

Vault auto-generates credentials with short TTL:

  • App fetches credentials from Vault
  • Vault automatically renews lease (at 67% of TTL)
  • On expiration, Vault revokes access
  • On renewal failure, app requests new credentials

Pattern 3: TLS Certificate Rotation

Using cert-manager + Vault PKI:

  • cert-manager requests certificate from Vault
  • Automatically renews before expiration (default: 67% of duration)
  • Updates Kubernetes Secret on renewal
  • Optional pod restart (via Reloader)

Secret Scanning

Pre-Commit Hooks (Gitleaks)

# Install Gitleaks
brew install gitleaks

# Run on staged files
gitleaks protect --staged --verbose

CI/CD Integration (GitHub Actions)

- name: Run Gitleaks
uses: gitleaks/gitleaks-action@v2

Remediation Workflow

When a secret is leaked:

  1. Rotate immediately (within 1 hour)
  2. Revoke at provider
  3. Remove from Git history (BFG Repo-Cleaner)
  4. Force push (notify team)
  5. Audit access (who had access during leak window)
  6. Document incident

Library Recommendations (2025)

Secret Stores

LibraryUse CaseTrust Score
HashiCorp VaultEnterprise, multi-cloudHigh (73.3/100)
External Secrets OperatorKubernetes integrationHigh (85.0/100)
AWS Secrets ManagerAWS workloadsHigh
GCP Secret ManagerGCP workloadsHigh
Azure Key VaultAzure workloadsHigh

Secret Scanning

LibraryUse CaseTrust Score
GitleaksPre-commit, CI/CDHigh (89.9/100)
TruffleHogGit history scanningMedium

Client Libraries

LanguageLibraryVersion
Pythonhvac2.2.0+
Govault/apiLatest
TypeScriptnode-vault0.10.2+
Rustvaultrs0.7+

Security Best Practices

  1. Never commit secrets to Git (use Gitleaks pre-commit hook)
  2. Use dynamic secrets where possible
  3. Rotate secrets regularly (quarterly for static, hourly for dynamic)
  4. Implement least privilege (Vault policies, RBAC)
  5. Enable audit logging
  6. Encrypt at rest (Vault storage, etcd encryption)
  7. Use short TTLs (< 24 hours for dynamic secrets)
  8. Monitor failed access attempts

Common Pitfalls

Secrets in Environment Variables

Environment variables visible in process lists.

Solution: Use file-based secrets (Kubernetes volumes, CSI driver).

Hardcoded Secrets in Manifests

Base64 is not encryption.

Solution: Use External Secrets Operator.

No Secret Rotation

Stale credentials increase breach risk.

Solution: Use dynamic secrets or automate rotation.

Root Token in Production

Unlimited permissions.

Solution: Use auth methods with least privilege policies.

References