A tool and a library to manage application secrets and configuration safely and effectively.
Here some of the key-points and advantages:
;-)
)Now available with a GUI as well:
(Many thanks to Eugene Tolbakov @etolbakov)
1Config uses the same security model as Amazon S3 server-side encryption, EBS volumes encryption and Amazon RDS encryption. It uses Amazon KMS to generate a master encryption key for each application managed by 1Config. Then for each configuration entry a new encryption key is generated, it is used to encrypt the configuration entry, then the key itself is encrypted using the master encryption key, and it is stored along with the encrypted payload.
It means that every configuration entry is encrypted with its own key. With the above strategy we benefit from all the KMS security features, such as: the ability to rotate keys, we minimalize the impact of getting one key compromised, and the ability to have fine grained control on how can access the key to encrypt/decrypt configuration entries.
The diagram explains how to security model works. Here the steps involved:
1cfg
) creates a new
master encryption key for the Application.1Config
).1Config
.Many thanks to all the contributors to this project, to those who helped to shape it with their ideas, testing, suggestions, and PRs.
A very special thanks to:
Copyright © 2019-2021 Bruno Bonacci - Distributed under the Apache License v2.0
Can you improve this documentation? These fine people already did:
Bruno Bonacci, Eugene Tolbakov & Sathyavijayan VittalEdit on GitHub
cljdoc builds & hosts documentation for Clojure/Script libraries
Ctrl+k | Jump to recent docs |
← | Move to previous article |
→ | Move to next article |
Ctrl+/ | Jump to the search field |