You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The management of sensitive information and its storage in version control systems such as Git involves additional complexity to avoid this data being in plain text.
Currently there are multiple systems whose mission is to cover this need, but the decision is not easy, there are differences depending on the platform used, storage costs, disaster recovery techniques, among other elements. I think it would be interesting and timely to identify how teams should approach this issue, such as:
what characteristics the system used must meet
how to automate the generation of secret objects in code repositories
where the encryption keys used should be stored
object renewal techniques when changing the encryption key
techniques or recommendations to remove sensitive information in plain text from version control
The text was updated successfully, but these errors were encountered:
The management of sensitive information and its storage in version control systems such as Git involves additional complexity to avoid this data being in plain text.
Currently there are multiple systems whose mission is to cover this need, but the decision is not easy, there are differences depending on the platform used, storage costs, disaster recovery techniques, among other elements. I think it would be interesting and timely to identify how teams should approach this issue, such as:
The text was updated successfully, but these errors were encountered: