Managing Secrets, Keys, and Passwords
Learn about managing secrets, keys, and passwords.
We'll cover the following
In the first section of this course, we hand-waved over managing sensitive values that must be stored in the app’s UNIX environment in production. Let’s talk about that now.
The short answer is, of course, that it depends. The other thing to understand is that we cannot absolutely prevent unauthorized access to our secrets. No system can absolutely prevent the exfiltration of sensitive data.
Get hands-on with 1200+ tech skills courses.