Closed joshgav closed 4 months ago
What about bitnami sealed-secret?
This is still a domain we're looking to simplify. Our next step is to set initial goals and activities and gather stakeholders to discuss. Let's keep working on this Google doc: https://docs.google.com/document/d/1-9ZU7yRB3oVKozIDO5FkkZQc1svvBj4ME8pUOqN9Mjw/
Wanted to add a couple other items that have come up recently:
SecretClass
in K8s secrets and allow them to be backed by any of several implementations 🤔Many thanks @joshgav to take the time to grab projects/ideas and to highlight many of the points that we should improve around the binding
which is a simple concept that all of us we understand but which is complex to implement and support as many systems/actors are involved :-)
The action to bind requires under the hood to perform the following actions that we are trying to support part of the Primaza project:
Remark: Different strategies should be reviewed in order to find the best approach(es) to pass the information in a more flexible way or less-locked model:
I'm interested in potentially helping out with this. I'm a member of TAG Security and a maintainer of Conjur Open Source.
In trying to get alignment on current WG priorities, I am going to suggest we close this topic. But before doing so, I want to give 1 week for anyone who is interested to revive the focus on this, else we can reopen in the future when we have the right people/energies to commit to this topic.
Thanks!
Per my last message, I am closing for now but am happy to reopen this conversation if it becomes higher priority / has a sponsor to drive it!
Instead of closing it, it should be better to move the request/issue to a future milestone
:exclamation: If you're interested in supporting and driving this work please respond to this issue. Once we have enough interest we'll schedule an initial meeting to review current ideas and proposals.
Background
The Platforms group is going deep into capability domains for platforms to seek ways to reduce complexity and increase synergies and standardization across related projects, vendors and users.
One of the domains which many find hard to rationalize today is how to seamlessly bind workloads to the capabilities or services they rely on. That is, workloads must be able to authenticate and connect to databases, object stores, message brokers, observability systems and more and there are many different ways to accomplish this.
At a high level this binding is typically accomplished by 1) getting a credential and URL from the service; 2) securely storing that info in a secure store like Hashicorp Vault; and 3) injecting that info into workloads in specific formats and locations. However, it seems every service, every platform, every secure store and every workload type has a different way to accomplish these steps.
This leads to difficulty, confusion and delay for cloud developers and lots of discomfort and concern to cloud security practitioners about how secrets are managed. For example, many folks may not realize that some projects write secret data in Kubernetes secrets as it's transferred to the workload, a practice some enterprises don't allow.
We've jumpstarted discussion about projects and ideas to address this in this Google doc. I'll copy the two main sections here to continue discussion.
Please share other projects and ideas with us and if/how you can contribute. Thanks!
Related Projects and Services
Ideas
SecretClass
to Kubernetes secrets and enable alternate implementations, e.g. served from an external store rather than etcd. Compare to ClusterClass and StorageClass.cc @monadic @raffaelespazzoli @sttts @sabre1041 @hiddeco @cmoulliard