Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Cloud Security Best Practices: Finding, Securing, & Managing Secrets, Part 2

by Tom McLaughlin , posted in Cloud Security Best Practices, Cloud Security Maturity, Managing Secrets

Starting Your Cloud Security Journey Part 3-2.png

In Part 1 of this post we explained how you can find all the secrets in your environment. In Part 2 we will discuss effective ways to store and manage secrets — to keep them from leaking to unauthorized people.

Read More [fa icon=long-arrow-right"]

Feb 26, 2017 10:32:57 AM

[fa icon="comment"] 0 Comments

Cloud Security Best Practices: Finding, Securing, & Managing Secrets, Part 1 — truffleHog & git-secrets

by Tom McLaughlin , posted in Cloud Security Best Practices, Cloud Security Maturity, Managing Secrets

Starting Your Cloud Security Journey Part 3.png

Secrets — passwords, API keys, secure tokens, private keys, and so on — protect access to sensitive resources in your environment. If not properly managed, they can end up in the wrong hands.

In Part 1 of this post, we will show you how to find secrets using truffleHog and git-secrets. In Part 2, we will explain how to manage them using appropriate software tools in order to quickly and cost-effectively achieve a higher level of security.

Read More [fa icon=long-arrow-right"]

Feb 21, 2017 2:23:48 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all