DevOps & InfrastructureCI/CD

Secret Management

Overview

Direct Answer

Secret Management is the centralised practice of securely storing, retrieving, and rotating sensitive credentials—including API keys, database passwords, certificates, and authentication tokens—throughout an application's lifecycle. It enforces principle-of-least-privilege access and maintains an audit trail of credential usage.

How It Works

Dedicated secret vaults encrypt credentials at rest and in transit, typically using key derivation and envelope encryption. Applications authenticate to the vault (rather than embedding credentials) and receive short-lived access tokens or decrypted values on-demand. Rotation policies automatically refresh secrets without manual intervention or application downtime.

Why It Matters

Organisations reduce breach surface area and compliance violations by eliminating hardcoded credentials in codebases and configuration files. Regulatory frameworks (PCI-DSS, HIPAA, SOC 2) mandate centralised credential control, while automated rotation minimises exposure windows and incident response costs.

Common Applications

Kubernetes clusters use native secret objects or external vaults to manage database credentials and container registry access. CI/CD pipelines retrieve deployment tokens and cloud provider credentials during build stages. Microservice architectures leverage HashiCorp Vault or cloud-native solutions to authenticate inter-service calls.

Key Considerations

Secret sprawl—accumulation of unused or forgotten credentials—remains a common challenge despite centralised storage. High-availability requirements and latency-sensitive workloads must balance security with performance when retrieving credentials at scale.

Cross-References(1)

Cloud Computing

More in DevOps & Infrastructure

See Also