Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret. Overview: - SealedSecrets as templates for secrets - Public key / Certificate Scopes Installation: - Controller - Kustomize - Helm Chart - Kubeseal - Homebrew - MacPorts - Linux Installation from source Upgrade Usage: - Managing existing secrets - Patching existing secrets - Update existing secrets - Raw mode (experimental) Validate a Sealed Secret Secret Rotation: - Sealing key renewal - User secret rotation - Early key renewal Common misconceptions about key renewal Manual key management (advanced) Re-encryption (advanced) Details (advanced) Crypto Developing FAQ: - Will you still be able to decrypt if you no longer have access to your cluster? - How can I do a backup of my SealedSecrets? - Can I decrypt my secrets offline with a backup key? - What flags are available for kubeseal? - How do I update parts of JSON/YAML/TOML/.. file
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A list of Windows privilege escalation techniques, categorized and explained in detail.
CLI for generating AWS IAM policy documents, SAM policy templates or SAM Connectors
A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.