Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655
Brian Vallelunga
And it's usually requiring a two key system. So like in a database, for example, you don't ever want to not be able to connect to the database. So you'd have two credentials to the database and you swap them and then you rotate one and then you swap again. And so you want a system that does all that. That should not be done by humans.
0
💬
0
Comments
Log in to comment.
There are no comments yet.