Is your feature request related to a problem? Please describe
We have a requirement from the Security team to save all types of sensitive data in Kubernetes Secrets.
It needs to use the future External Secret Operator to manage the Secret and fill it from trusted and encrypted storage (like Vault).
Moreover, they have a wider request:
- All types of sensitive data should be stored only in Kubernetes Secrets
- Data from Kubernetes Secret shouldn't be mounted as an ENV variable
- Kubernetes Secrets can be used like the following:
- Referer in the Custom Resource (CR) and read data from the Secret in the program controller
- Discover and read data from Secrets in the program controller
- Mount as a file in a container rootfs
Types of sensitive data:
- Credentials
- Tokens
- Private parts of certificates (all types of certificates can be saved in Secrets)
Describe the solution you'd like
Need to:
- Check all components included in Monitoring
- Find which credentials are being used and how using in these components
- Fix if somewhere data from Secret mount as ENV
Describe alternatives you've considered
No response
Additional information
No response
Is your feature request related to a problem? Please describe
We have a requirement from the Security team to save all types of sensitive data in Kubernetes Secrets.
It needs to use the future External Secret Operator to manage the Secret and fill it from trusted and encrypted storage (like Vault).
Moreover, they have a wider request:
Types of sensitive data:
Describe the solution you'd like
Need to:
Describe alternatives you've considered
No response
Additional information
No response