Skip to content
This repository has been archived by the owner on May 17, 2021. It is now read-only.

Investigate using Hashicorp Vault (or alternative) for secret management #53

Open
MacND opened this issue Nov 20, 2019 · 0 comments
Open
Labels
question Further information is requested

Comments

@MacND
Copy link
Owner

MacND commented Nov 20, 2019

Description

Having API keys and database credentials in plaintext on a server is just bad, I want to get away from it. Using Vault (or alt.) would give audited, secured access to the important secrets used by the bot.

User Story

This would drastically improve security, and could be managed via configuration management like Ansible for the infrastructure. It also promotes best practices using a widely adopted, continuously developed tool that I'd be looking to learn anyway.

Gemalto (payment security) did a presentation on Vault with NodeJS, and T-Mobile have created their own version Vault for secret management too.

@MacND MacND added the question Further information is requested label Nov 20, 2019
@MacND MacND changed the title Investigate using Hashicorp Vault for secret management Investigate using Hashicorp Vault (or alternative) for secret management Dec 2, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

1 participant