Secrets Management in 2025: Vault, AWS Secrets Manager, and Beyond
0
Secrets must be short‑lived, discoverable, and well‑governed. This guide shows reference patterns and guardrails.
Core patterns
- Central store (Vault/SM) + KMS envelopes
- Dynamic creds (DB, cloud) with TTL; auto-rotation
- App auth via OIDC/JWT; no static tokens in code
Developer workflows
- Local dev: ephemeral secrets via CLI login; env injection at runtime
- CI: OIDC to cloud; fetch time‑bound creds; no stored secrets
Detection
- Pre‑commit and repo scanners; revoke on detection; honeytokens
Example (Vault JWT auth)
vault write auth/jwt/config jwks_url=https://... bound_issuer=https://...
FAQ
Q: Are environment variables safe?
A: Acceptable for short‑lived runtime injection; avoid storing long‑term secrets in env or files.
About the author
Elysiate publishes practical guides and privacy-first tools for data workflows, developer tooling, SEO, and product engineering.