From CISO Marketplace — the hub for security professionals Visit

Kubernetes Secret Management

Cloud Security

Definition

Practices and tools for securely storing, distributing, rotating, and auditing sensitive configuration data — API keys, certificates, database passwords — in Kubernetes environments to prevent secret sprawl and credential exposure.

Technical Details

Kubernetes Secrets are base64-encoded (not encrypted) by default and stored in etcd in plaintext unless encryption-at-rest is configured. External secrets management systems (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager) with secrets injection via the External Secrets Operator or CSI secrets driver provide encryption, auditing, and automatic rotation. All secret access should be logged and bounded to specific workloads via RBAC and workload identity.

Practical Usage

Platform teams should configure Kubernetes etcd encryption-at-rest, disable default service account token mounting, and migrate sensitive values from ConfigMaps and environment variables to a secrets management system with audit logging. Secrets should be rotated automatically and access should be governed by workload identity rather than shared static credentials.

Examples

Related Terms

Kubernetes RBAC Misconfiguration Workload Identity Container Security Key Management Cloud Security
← Back to Glossary