Sealed Secrets Logo

Sealed Secrets

0
Free
Visit Website

Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret. Overview: - SealedSecrets as templates for secrets - Public key / Certificate Scopes Installation: - Controller - Kustomize - Helm Chart - Kubeseal - Homebrew - MacPorts - Linux Installation from source Upgrade Usage: - Managing existing secrets - Patching existing secrets - Update existing secrets - Raw mode (experimental) Validate a Sealed Secret Secret Rotation: - Sealing key renewal - User secret rotation - Early key renewal Common misconceptions about key renewal Manual key management (advanced) Re-encryption (advanced) Details (advanced) Crypto Developing FAQ: - Will you still be able to decrypt if you no longer have access to your cluster? - How can I do a backup of my SealedSecrets? - Can I decrypt my secrets offline with a backup key? - What flags are available for kubeseal? - How do I update parts of JSON/YAML/TOML/.. file

FEATURES

ALTERNATIVES

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Free

Safely store secrets in version control repositories with GPG encryption support.

Free

A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.

Free

CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.

Free

Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.

Free

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Free

The Ping Identity Platform is an enterprise identity and access management solution that provides authentication, authorization, and identity governance capabilities with flexible deployment options for securing customer, workforce, and partner identities.

Commercial

A cloud-based platform that discovers, monitors, and manages non-human identities and their associated credentials across cloud infrastructure.

Commercial

PINNED