Open
Description
Current situation
At the moment, we store secrets in AWS KMS or GitHub Actions secrets.
KMS:
- Pros:
- logging into aws leaves a trail
- Cons:
- an admin can read the value of the secret easily without leaving a trail
GitHub Actions secrets:
- Pros:
- GitHub secrets are not readable from the UI
- Cons:
- One can read GitHub secrets by pushing code that edits them and print them (e.g. write the secret to a file, separate each character with a
- One can read GitHub secrets by pushing code that edits them and print them (e.g. write the secret to a file, separate each character with a
Solution
Consider using a secret manager that audits when secrets are accessed. E.g. GitHub Actions read secrets from this manager and the manager logs that a secret was accessed from the action.
Example: AWS Secrets Manager
Context
discussion started in zulip#t-infra > meeting 2025-03-24 @ 💬
Metadata
Metadata
Assignees
Labels
No labels