Cloud Secret Management
Cloud secret management is the practice of centrally storing, controlling access to, rotating, and auditing sensitive credentials — API keys, database passwords, TLS certificates, and OAuth tokens — in a dedicated secrets store rather than embedding them in code or configuration files.
Cloud secret management is the practice of centrally storing, controlling access to, rotating, and auditing sensitive credentials — API keys, database passwords, TLS certificates, and OAuth tokens — in a dedicated secrets store rather than embedding them in code or configuration files.
Hardcoded credentials in source code are one of the most common and critical security vulnerabilities. Secret management services (AWS Secrets Manager, HashiCorp Vault, Google Secret Manager, Azure Key Vault) solve this by treating secrets as first-class managed resources with:
Encrypted storage: Secrets are encrypted at rest using cloud KMS (Key Management Service). The encryption key itself may be customer-managed (CMEK), giving full control over key rotation and access.
Fine-grained access control: IAM policies grant specific roles or service accounts read access to only the secrets they need. A Lambda function's execution role might have secretsmanager:GetSecretValue permission only for the secrets it uses — nothing more.
Automatic rotation: Secrets Manager can rotate database passwords on a schedule (e.g., every 30 days). A rotation Lambda updates the credentials in both the secrets store and the target database atomically. Applications reading the secret on each request automatically receive the new value.
Audit logging: Every GetSecretValue API call is logged to CloudTrail (or equivalent), creating an immutable record of when secrets were accessed, by whom, and from which IP or service.
Workload injection: In Kubernetes, the Secrets Store CSI Driver or a sidecar agent fetches secrets from Vault/Secrets Manager and mounts them as files or environment variables into pod containers at startup — no secrets stored in etcd.
See Cloud IAM Permission Model for how access to secrets is authorized, and Container Deployment Pipeline for how secrets reach containers during deployment.