Wednesday, 14 September 2016

Managing secrets

https://www.vaultproject.io/
https://square.github.io/keywhiz/
https://medium.com/@Pinterest_Engineering/open-sourcing-knox-a-secret-key-management-service-3ec3a47f5bb
https://blog.threatstack.com/cloud-security-best-practices-finding-securing-managing-secrets-part-2
https://github.com/codahale/sneaker
https://medium.com/@mda590/simple-secrets-management-via-aws-ec2-parameter-store-737477e19450


Using AWS KSM:
https://aws.amazon.com/ec2/systems-manager/parameter-store/
http://docs.aws.amazon.com/cli/latest/reference/ssm/
Create KMS Key:
1. IAM -> Encryption Keys
2. Create Key
3. Enter Alias/Decription/Advanced (AWS to generate key or choose External)
4. Define who can administer the key: IAM users
5. Define who can use the key
6. Will be shown key's policy. Click Finish

aws --region=us-east-2 ssm put-parameter --name "secret-password" --value 'password1234' --type SecureString --key-id alias/secret-strings
aws --region=us-east-2 ssm get-parameters --names "secret-password" --with-decryption
aws ssm describe-parameters

Update 28/11/2017 - Strongbox:
https://schibsted.github.io/strongbox/

Update 5/4/2018: AWS Secrets Manager:
https://aws.amazon.com/blogs/aws/aws-secrets-manager-store-distribute-and-rotate-credentials-securely/

No comments:

Post a Comment