Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add How Secrets Sprawl is Slowing You Down—And What to Do About It blog #13095

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

dirien
Copy link
Contributor

@dirien dirien commented Oct 10, 2024

Proposed changes

Unreleased product version (optional)

Related issues (optional)

@pulumi-bot
Copy link
Collaborator

Copy link
Contributor

@adamgordonbell adamgordonbell left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left some comments.

I think it works as is, but also it would be a bit more engaging with a very specific example.


As we keep adding new cloud resources and releasing new applications, the number of secrets we need to manage keeps growing: passwords, API keys, certificates, and more. And as this is not enough, we need to manage secrets across different systems and environments with different teams that need to access them; we end up with duplicates.

Let's have a look at a typical environment and see what teams use: Everything container-related may use Docker secrets or Kubernetes secrets. There is also a high chance that they might use cloud-specific secrets managers like Azure Key Vault, AWS Secrets Manager, or Google Secret Manager. In addition to these, there is a high chance that they might use HashiCorp Vault or some enterprise-grade secrets manager like CyberArk.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be interesting to actually give a very tangible example.

Imagine Alice, not her real name. When she first setup K8S at Acme Corp, Kubernetes secrets was a natural choice. Then X happened and her college Bob brought in AWS Secrets managers.....

Now a password needs to change, and Alice is spending so much time tracking everything down. Each step along the way made sense, but now she's stuck in Secret Sprawl (tm).

And tell the whole sprawl story from a very specific fictional team example, before switching to the ESC plug.

@pulumi-bot
Copy link
Collaborator

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants