Saumitra Topinkattisaumitra-dev.hashnode.dev·17 hours agoSecuring and Rotating Secrets Easily with AWS Secrets Manager (Part 2 of 2)Quick Recap In Part 1, we discussed upon configuring AWS Secrets Manager, AWS Lambda, and Automatic Rotation for our Secret. We also defined permissions for our Lambda function, which enabled the Secrets Manager to invoke it on a scheduled basis. In ...DiscussAWS
Anmol Baranwalanmolbaranwal.hashnode.dev·Apr 30, 2024🚀 21 Tools to take your dev skills to the moonI've seen hundreds of AI tools and many of them are changing the world. As developers, there's always so much to learn, and it's important to focus on saving time to work on things that matter. I will cover 21 Tools for developers that can make your ...Discuss·10 likes·51 readsAI
Saumitra Topinkattisaumitra-dev.hashnode.dev·Apr 21, 2024Securing and Rotating Secrets Easily with AWS Secrets Manager (Part 1 of 2)Managing secrets has always been a significant aspect when deploying applications. Typically, we set up a pipeline to provide secrets to our application as Environment Variables. For enhanced security, we can also choose to encrypt our secrets and st...Discuss·27 readsAWS
Sober Summyblog.summy.dev·Apr 16, 2024Decoding Security: Secret Manager or Environment Variables?Let me tell you how I ended up at this point where I started using Secret Manager, I was building my portfolio application (www.summy.dev) and I wanted to use some 3rd party apis for my application and I wanted to store the access tokens and as a com...Discuss·111 readssecrets management
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Feb 27, 2024Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided RoadmapLet's face it: acquiring enterprise security software can feel daunting. There are so many competing security priorities in the enterprise, making it hard to know which ones to address and in what order. Once you are ready to evaluate solutions, it c...Discussenterprise software
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Feb 22, 2024Beyond Basics: Advanced Techniques for Securing Argo CD and Updating AWS Secrets using TerraformOver View:- #Argo CD is a #powerful tool for #continuous delivery of #Kubernetes applications. However, securing access to its #admin password is crucial. In this guide, we will explore the process of fetching the #Argo CD admin password and then sec...Discuss·64 readsArgoCD
kumaraswamy gorjakumargorja.tech·Feb 22, 2024Unveiling the Power of Secure Cloud Infrastructure: Integrating HashiCorp Vault with AWS using TerraformEmbarking on a journey to fortify cloud security, I recently undertook a project to seamlessly integrate HashiCorp Vault with AWS infrastructure using Terraform. This endeavor not only enhanced the security posture but also streamlined the management...Discusssecrets management
Brandon Buibrandonbui.me·Feb 17, 2024Don't share your SECRETS!From personal projects to enterprise grade source code, leaked secrets such as API Keys, OAuth tokens, certificates, and credentials, despite being sensitive pieces of data, are all too often committed to repositories. For many of us, git is how we a...Discusscybersecurity
Mrinal Wahalforenvsecretsblog.envsecrets.com·Feb 7, 2024Ditch the .env filesIn the modern era of software development, the management of environment variables and secrets is paramount to ensuring the security and integrity of applications. However, the conventional practice of storing sensitive information in .env files pose...Discuss·274 readssecrets
Pranav ShikarpurforPangea Blogpangea.cloud·Feb 5, 2024A Guide to Choosing a Secure Vault for Your Application Secrets and KeysSo you’ve decided to throw away those .env files with all your app secrets and move to a more secure option. Well first off, congratulations 🎉, you’re on your way to evading cyber attacks involving exposed secrets! Vault Considerations 🧐 While choo...Discuss·53 readsVault