Epic: Secrets Management #9

Open
opened 2026-03-29 23:17:42 +02:00 by claude · 0 comments
Owner

Overview

Platform-managed secrets with external vault integration from day 1. Customer Camel applications need connection credentials for external systems without hardcoding them in JARs.

Day 1 Requirements

  • Platform-native secret store (encrypted at rest in platform PostgreSQL or K8s Secrets)
  • External vault integration:
    • HashiCorp Vault
    • AWS Secrets Manager
    • Azure Key Vault
    • GCP Secret Manager
  • Secrets injected into Camel app containers as environment variables or mounted files
  • Secret rotation support (update secret → rolling restart of affected apps)
  • RBAC: only authorized team members can create/view/rotate secrets

Architecture

  • Secrets API in the management platform
  • Per-environment secret scoping (dev secrets ≠ prod secrets)
  • External vault sync: platform reads from customer's vault at deploy time or runtime
  • K8s External Secrets Operator for vault-to-K8s-secret synchronization
  • Audit logging of all secret access

Tenant Isolation

  • Secrets strictly scoped to tenant + environment
  • No cross-tenant secret access possible
  • Shared storage encrypted with per-tenant keys (envelope encryption)

Future

  • Secret versioning and rollback
  • Automatic credential rotation (database passwords, API keys)
  • Secret scanning in uploaded JARs (detect accidentally bundled credentials)
## Overview Platform-managed secrets with external vault integration from day 1. Customer Camel applications need connection credentials for external systems without hardcoding them in JARs. ## Day 1 Requirements - Platform-native secret store (encrypted at rest in platform PostgreSQL or K8s Secrets) - External vault integration: - HashiCorp Vault - AWS Secrets Manager - Azure Key Vault - GCP Secret Manager - Secrets injected into Camel app containers as environment variables or mounted files - Secret rotation support (update secret → rolling restart of affected apps) - RBAC: only authorized team members can create/view/rotate secrets ## Architecture - Secrets API in the management platform - Per-environment secret scoping (dev secrets ≠ prod secrets) - External vault sync: platform reads from customer's vault at deploy time or runtime - K8s External Secrets Operator for vault-to-K8s-secret synchronization - Audit logging of all secret access ## Tenant Isolation - Secrets strictly scoped to tenant + environment - No cross-tenant secret access possible - Shared storage encrypted with per-tenant keys (envelope encryption) ## Future - Secret versioning and rollback - Automatic credential rotation (database passwords, API keys) - Secret scanning in uploaded JARs (detect accidentally bundled credentials)
claude added the epicsecrets labels 2026-03-29 23:18:03 +02:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: cameleer/cameleer-saas#9