
The Gap Between Encrypting Secrets and Proving You Handled Them Right
There's a moment in every secrets pipeline that nobody talks about. You encrypt your secrets at rest. You store them in git as ciphertext. You manage KMS keys with IAM policies. You rotate credentials. You might even use SOPS or sealed-secrets or Vault. Your secrets management story sounds solid in an architecture review. But at some point, something has to decrypt those secrets and do something with them. And that something runs on a CI runner. The Plaintext Moment Think about what happens during a typical deployment. Your CI pipeline checks out the repo, decrypts SOPS-encrypted files, merges the right values for the target service and environment, re-encrypts them into a deployment artifact, and pushes it somewhere your runtime can consume it. For a brief window, plaintext secrets exist in memory on a general-purpose compute environment. The same environment that runs your test suite, your linters, your build tools, and whatever transitive dependencies those tools pulled in this week
Continue reading on Dev.to DevOps
Opens in a new tab



