Skip to content

Check and move all sensitive data in Kubernetes Secrets #198

@asatt

Description

@asatt

Is your feature request related to a problem? Please describe

We have a requirement from the Security team to save all types of sensitive data in Kubernetes Secrets.
It needs to use the future External Secret Operator to manage the Secret and fill it from trusted and encrypted storage (like Vault).

Moreover, they have a wider request:

  • All types of sensitive data should be stored only in Kubernetes Secrets
  • Data from Kubernetes Secret shouldn't be mounted as an ENV variable
  • Kubernetes Secrets can be used like the following:
    • Referer in the Custom Resource (CR) and read data from the Secret in the program controller
    • Discover and read data from Secrets in the program controller
    • Mount as a file in a container rootfs

Types of sensitive data:

  • Credentials
  • Tokens
  • Private parts of certificates (all types of certificates can be saved in Secrets)

Describe the solution you'd like

Need to:

  • Check all components included in Monitoring
  • Find which credentials are being used and how using in these components
  • Fix if somewhere data from Secret mount as ENV

Describe alternatives you've considered

No response

Additional information

No response

Metadata

Metadata

Labels

enhancementNew feature or request
No fields configured for Feature.

Projects

Status

In Review

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions