Secrets Management in 2025: Vault, AWS Secrets Manager, and Beyond
Oct 26, 2025•
secretsvaultawskms
• 0
Secrets must be short‑lived, discoverable, and well‑governed. This guide shows reference patterns and guardrails.
Core patterns
- Central store (Vault/SM) + KMS envelopes
- Dynamic creds (DB, cloud) with TTL; auto-rotation
- App auth via OIDC/JWT; no static tokens in code
Developer workflows
- Local dev: ephemeral secrets via CLI login; env injection at runtime
- CI: OIDC to cloud; fetch time‑bound creds; no stored secrets
Detection
- Pre‑commit and repo scanners; revoke on detection; honeytokens
Example (Vault JWT auth)
vault write auth/jwt/config jwks_url=https://... bound_issuer=https://...
FAQ
Q: Are environment variables safe?
A: Acceptable for short‑lived runtime injection; avoid storing long‑term secrets in env or files.