Menu
Sign In Pricing Add Podcast

Ruby Rogues

Secrets Management Best Practices and Tools - RUBY 655

1491.797 - 1508.361 Brian Vallelunga

And it's usually requiring a two key system. So like in a database, for example, you don't ever want to not be able to connect to the database. So you'd have two credentials to the database and you swap them and then you rotate one and then you swap again. And so you want a system that does all that. That should not be done by humans.

0
💬 0

Comments

There are no comments yet.

Log in to comment.