Many applications require credentials to connect to a database, API keys to invoke a service, or certificates for authentication. Managing and securing access to these secrets is often complicated by secret sprawl, poor visibility, or lack of integrations.
Secret Manager is a new Google Cloud service that provides a secure and convenient method for storing API keys, passwords, certificates, and other sensitive data. Secret Manager provides a central place and single source of truth to manage, access, and audit secrets across Google Cloud.
Secret Manager offers many important features:
-
Global names and replication: Secrets are project-global resources. You can choose between automatic and user-managed replication policies, so you control where your secret data is stored.
-
First-class versioning: Secret data is immutable and most operations take place on secret versions. With Secret Manager, you can pin a secret to specific versions like
42or floating aliases likelatest. -
Principles of least privilege: Only project owners have permissions to access secrets. Other roles must explicitly be granted permissions through Cloud IAM.
-
Audit logging: WithCloud Audit Logging enabled, every interaction with Secret Manager generates an audit entry. You can ingest these logs into anomaly detection systems to spot abnormal access patterns and alert on possible security breaches.
-
Strong encryption guarantees: Data is encrypted in transit with TLS and at rest with AES-256-bit encryption keys. Support for customer-managed encryption keys (CMEK) is coming soon.
-
VPC Service Controls: Enable context-aware access to Secret Manager from hybrid environments withVPC Service Controls.
The Secret Manager beta is available to all Google Cloud customers today. To get started, check out the Secret Manager Quickstarts . Let's take a deeper dive into some of Secret Manager’s functionality.
Global names and replication
Early customer feedback identified that regionalization is often a pain point in existing secrets management tools, even though credentials like API keys or certificates rarely differ across cloud regions. For this reason, secret names are global within their project.
While secret names are global, the secret data is regional. Some enterprises want full control over the regions in which their secrets are stored, while others do not have a preference. Secret Manager addresses both of these customer requirements and preferences with replication policies .
-
Automatic replication: The simplest replication policy is to let Google choose the regions where Secret Manager secrets should be replicated.
-
User-managed replication: If given a user-managed replication policy, Secret Manager replicates secret data into all the user-supplied locations. You don’t need to install any additional software or run additional services—Google handles data replication to your specified regions. Customers who want more control over the regions where their secret data is stored should choose this replication strategy.
First-class versioning
Versioning is a core tenet of reliable systems to support gradual rollout, emergency rollback, and auditing. Secret Manager automatically versions secret data using secret versions , and most operations—like access, destroy, disable, and enable—take place on a secret version.
Production deployments should always be pinned to a specific secret version. Updating a secret should be treated in the same way as deploying a new version of the application. Rapid iteration environments like development
and staging
, on the other hand, can use Secret Manager's latest
alias, which always returns the most recent version of the secret.
Integrations
In addition to theSecret Manager API andclient libraries, you can also use the Cloud SDK to create secrets:
<!----><code _ngcontent-c38="">$ gcloud beta secrets create "my-secret" \
</code><code _ngcontent-c38=""> --replication-policy "automatic" \
</code><code _ngcontent-c38=""> --data-file "/tmp/my-secret.txt"</code>
and to access secret versions:
<!----><code _ngcontent-c38="">$ gcloud beta secrets versions access "latest" \
</code><code _ngcontent-c38=""> --secret "my-secret"</code>
Discovering secrets
As mentioned above, Secret Manager can store a variety of secrets. You can useCloud DLP to help find secrets usinginfoType detectors for credentials and secrets. The following command will search all files in a source directory and produce a report of possible secrets to migrate to Secret Manager:
<!----><code _ngcontent-c38="">$ find . -type f | xargs -n1 gcloud alpha dlp text inspect \
</code><code _ngcontent-c38=""> --info-types="AUTH_TOKEN,ENCRYPTION_KEY,GCP_CREDENTIALS,PASSWORD" \
</code><code _ngcontent-c38=""> --content-file</code>
If you currently store secrets in a Cloud Storage bucket, you can configure a DLP job to scan your bucket in the Cloud Console.
Over time, native Secret Manager integrations will become available in other Google Cloud products and services.
What about Berglas?
Berglas
is an open source project for managing secrets on Google Cloud. You can continue to use Berglas as-is and, beginning with v0.5.0
, you can use it to create and access secrets directly from Secret Manager using the sm://
prefix.
$ berglas access sm://my-project/api-key
If you want to move your secrets from Berglas into Secret Manager, the berglas migrate
command provides a one-time automated migration.
Accelerating security
Security is central to modern software development, and we’re excited to help you make your environment more secure by adding secrets management to our existing Google Cloud security product portfolio. With Secret Manager, you can easily manage, audit, and access secrets like API keys and credentials across Google Cloud.
To learn more, check out the Secret Manager documentation and Secret Manager pricing pages.
Posted in:
以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网
猜你喜欢:本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们。
白话机器学习算法
[新加坡] 黄莉婷、[新加坡] 苏川集 / 武传海 / 人民邮电出版社 / 2019-2 / 49.00元
与使用数学语言或计算机编程语言讲解算法的书不同,本书另辟蹊径,用通俗易懂的人类语言以及大量有趣的示例和插图讲解10多种前沿的机器学习算法。内容涵盖k均值聚类、主成分分析、关联规则、社会网络分析等无监督学习算法,以及回归分析、k最近邻、支持向量机、决策树、随机森林、神经网络等监督学习算法,并概述强化学习算法的思想。任何对机器学习和数据科学怀有好奇心的人都可以通过本书构建知识体系。一起来看看 《白话机器学习算法》 这本书的介绍吧!