Many applications require credentials to connect to a database, API keys to invoke a service, or certificates for authentication. Managing and securing access to these secrets is often complicated by secret sprawl, poor visibility, or lack of integrations.
Secret Manager is a new Google Cloud service that provides a secure and convenient method for storing API keys, passwords, certificates, and other sensitive data. Secret Manager provides a central place and single source of truth to manage, access, and audit secrets across Google Cloud.
Secret Manager offers many important features:
-
Global names and replication: Secrets are project-global resources. You can choose between automatic and user-managed replication policies, so you control where your secret data is stored.
-
First-class versioning: Secret data is immutable and most operations take place on secret versions. With Secret Manager, you can pin a secret to specific versions like
42or floating aliases likelatest. -
Principles of least privilege: Only project owners have permissions to access secrets. Other roles must explicitly be granted permissions through Cloud IAM.
-
Audit logging: WithCloud Audit Logging enabled, every interaction with Secret Manager generates an audit entry. You can ingest these logs into anomaly detection systems to spot abnormal access patterns and alert on possible security breaches.
-
Strong encryption guarantees: Data is encrypted in transit with TLS and at rest with AES-256-bit encryption keys. Support for customer-managed encryption keys (CMEK) is coming soon.
-
VPC Service Controls: Enable context-aware access to Secret Manager from hybrid environments withVPC Service Controls.
The Secret Manager beta is available to all Google Cloud customers today. To get started, check out the Secret Manager Quickstarts . Let's take a deeper dive into some of Secret Manager’s functionality.
Global names and replication
Early customer feedback identified that regionalization is often a pain point in existing secrets management tools, even though credentials like API keys or certificates rarely differ across cloud regions. For this reason, secret names are global within their project.
While secret names are global, the secret data is regional. Some enterprises want full control over the regions in which their secrets are stored, while others do not have a preference. Secret Manager addresses both of these customer requirements and preferences with replication policies .
-
Automatic replication: The simplest replication policy is to let Google choose the regions where Secret Manager secrets should be replicated.
-
User-managed replication: If given a user-managed replication policy, Secret Manager replicates secret data into all the user-supplied locations. You don’t need to install any additional software or run additional services—Google handles data replication to your specified regions. Customers who want more control over the regions where their secret data is stored should choose this replication strategy.
First-class versioning
Versioning is a core tenet of reliable systems to support gradual rollout, emergency rollback, and auditing. Secret Manager automatically versions secret data using secret versions , and most operations—like access, destroy, disable, and enable—take place on a secret version.
Production deployments should always be pinned to a specific secret version. Updating a secret should be treated in the same way as deploying a new version of the application. Rapid iteration environments like development
and staging
, on the other hand, can use Secret Manager's latest
alias, which always returns the most recent version of the secret.
Integrations
In addition to theSecret Manager API andclient libraries, you can also use the Cloud SDK to create secrets:
<!----><code _ngcontent-c38="">$ gcloud beta secrets create "my-secret" \
</code><code _ngcontent-c38=""> --replication-policy "automatic" \
</code><code _ngcontent-c38=""> --data-file "/tmp/my-secret.txt"</code>
and to access secret versions:
<!----><code _ngcontent-c38="">$ gcloud beta secrets versions access "latest" \
</code><code _ngcontent-c38=""> --secret "my-secret"</code>
Discovering secrets
As mentioned above, Secret Manager can store a variety of secrets. You can useCloud DLP to help find secrets usinginfoType detectors for credentials and secrets. The following command will search all files in a source directory and produce a report of possible secrets to migrate to Secret Manager:
<!----><code _ngcontent-c38="">$ find . -type f | xargs -n1 gcloud alpha dlp text inspect \
</code><code _ngcontent-c38=""> --info-types="AUTH_TOKEN,ENCRYPTION_KEY,GCP_CREDENTIALS,PASSWORD" \
</code><code _ngcontent-c38=""> --content-file</code>
If you currently store secrets in a Cloud Storage bucket, you can configure a DLP job to scan your bucket in the Cloud Console.
Over time, native Secret Manager integrations will become available in other Google Cloud products and services.
What about Berglas?
Berglas
is an open source project for managing secrets on Google Cloud. You can continue to use Berglas as-is and, beginning with v0.5.0
, you can use it to create and access secrets directly from Secret Manager using the sm://
prefix.
$ berglas access sm://my-project/api-key
If you want to move your secrets from Berglas into Secret Manager, the berglas migrate
command provides a one-time automated migration.
Accelerating security
Security is central to modern software development, and we’re excited to help you make your environment more secure by adding secrets management to our existing Google Cloud security product portfolio. With Secret Manager, you can easily manage, audit, and access secrets like API keys and credentials across Google Cloud.
To learn more, check out the Secret Manager documentation and Secret Manager pricing pages.
Posted in:
以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网
猜你喜欢:本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们。
闪魂FLASH8网站建设实录
马谧铤 / 中国林业 / 2006-7 / 46.00元
《闪魂FLASH8网站建设实录》旨在提供以Flash(Flash 8.0为创作工具)为技术核心的整套互动网站的开发思路,其中包括了网站策划、平面设计、程序设计等实用的互联网应用技术。内容包括Photoshop CS2设计,FIash 8创作和ActionScript应用程序开发的操作流程。在技术学习的过程中.大家还将体会到顶级互动网站设计、网站建设的设计流程和思路。《闪魂FLASH8网站建设实录》......一起来看看 《闪魂FLASH8网站建设实录》 这本书的介绍吧!