Overview

  • Store, manage, access secrets as blobs or strings
  • Passwords, API keys, TLS certs etc.
  • Data immutible
    • New versions created with each modification
  • Best practices
    • Principle of least privilege
    • Limit access with IAM
    • Use Secret Manager API instead of environment variables
    • Reference secrets by version number

Graph View