What is Secrets Management?

  Рет қаралды 18,519

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 13
@mycotina6438
@mycotina6438 2 жыл бұрын
I'm still confused. How does this "request" process to the secret manager happens? In my understanding, the secret manager will only approve the "request" if the requestor can somehow prove that he/she is who he/she claims to be. But, isn't that means we are still dealing with user credentials here? So what does the secret manager really achieve? Is it just adding a centralized layer so that we can easily "revoke" a permission from a particular user to particular service?
@stanleysoman5179
@stanleysoman5179 4 жыл бұрын
Thanks for this. Kudos to the PM who thought of this. This feels like a much needed product. Thank you and kudos to the teams for making this happen.
@IBMTechnology
@IBMTechnology 4 жыл бұрын
Thank you for watching, Stanley! 🙌
@shayberkovich8104
@shayberkovich8104 4 жыл бұрын
The title of the video is somewhat confusing. It mostly goes over the usages of secret management and doesnt even scratch the surface of HOW this is implemented (i.e. HSM). I'd love to see more of latter.
@chadsexinton
@chadsexinton 2 ай бұрын
Why not use certificates?
@rickharold7884
@rickharold7884 4 жыл бұрын
That just kicks the ball down the street one level of indirection. It’s better and you can using the centralized mechanism fix a breach but the client still is the weak link. Thx for the videos. They are all interesting.
@truthexclusive9769
@truthexclusive9769 4 жыл бұрын
I need to login via single sign on Application. Prompts network credentials on this single sign on Page. What if I create synthetic ID(user/pwd)? Store them in Secret Mgr. I still would need user and password to login to SSO App for Automated Testing . Only difference is I now get the credentials calling SMS? 🤔 Is this ok Data Breach ?
@IBMTechnology
@IBMTechnology 4 жыл бұрын
Hey there! Depends on the secrets service you use. Ideally, if it is integrated with that SSO app then the app can ask that secrets manager service to confirm that user (based on ID) has the right access to these credentials without having to ever expose them outside of your secrets store. Some sort of abstracted value like a key could supplement for any value exposure, reduces exposure for data breach.
@MBlessing
@MBlessing 3 жыл бұрын
I needed this. Does anyone knows a similar secret store manager like the IBM DCM and google secret manager?
@dasaribrahmanaidu6536
@dasaribrahmanaidu6536 10 ай бұрын
Requester - AD/Cloiud permission under IAM Policies and protocols - Gaining level of acesss - 9 Minutes Clip ?
@hamdansajid
@hamdansajid 4 жыл бұрын
what is microservices
@IBMTechnology
@IBMTechnology 4 жыл бұрын
Hey Hamdan! 😃 This video might answer your question 👉 ibm.co/338sNtT You can also learn more about microservices in this guide: ibm.co/3l6Jqwz
@hamdansajid
@hamdansajid 4 жыл бұрын
awesome
Secrets management best practices for the modern enterprise
27:36
Effortless Secret Management in .NET Using AWS Secrets Manager
23:52
Milan Jovanović
Рет қаралды 63 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 93 М.
What is Infrastructure as Code?
8:51
IBM Technology
Рет қаралды 146 М.
What is a REST API?
9:12
IBM Technology
Рет қаралды 1,6 МЛН
Observability Explained with LogDNA
8:16
IBM Technology
Рет қаралды 21 М.
How to Properly Manage Application Secrets (5 LEVELS)
8:13
DevOps Directive
Рет қаралды 4,1 М.
Beyond secrets, using Vault to automate PKI
30:59
HashiCorp
Рет қаралды 6 М.
Our Journey Into Secrets Management With Vault
27:52
HashiCorp
Рет қаралды 1,5 М.
AWS Secrets Manager Service Overview with Demo
24:12
Be A Better Dev
Рет қаралды 45 М.