-
-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Key Management Options #50
Comments
Open to a proposal for this. Blacksky's cloud host allows for encrypting environment variables that are decrypted at runtime. But that doesn't translate to other hosts so though it isn't an urgent priority for Blacksky I think it's an important consideration for rsky. I don't have experience with the specific solutions you mentioned though. |
Happy to participate/review the proposal |
Does #54 relate to this inquiry? |
Not in particular. This inquiry is more about options for storing keys for RSky outside of environment variables |
idea: would y'all like to use sops's .sops.yaml as our key management configuration + tool? SOPS is flexible to multiple key management services but I am imagining the first use case may be AWS KMS where your
@rudyfraser I'm not entirely sure how the decryption works but perhaps sops can be incorporated in the process? |
Since we are currently storing our keys at the environment variable level at the moment, are there any plans on supporting a solution like Vault, KMS, etc... in order to better secure and hide the secret keys for RSky?
The text was updated successfully, but these errors were encountered: