generated from ministryofjustice/template-documentation-site
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #793 from ministryofjustice/feature/ND-564-Documen…
…t-process-to-hide-secrets-in-nacs-task-defs Feature/nd 564 document process to hide secrets in nacs task defs
- Loading branch information
Showing
2 changed files
with
45 additions
and
15 deletions.
There are no files selected for viewing
29 changes: 29 additions & 0 deletions
29
source/documentation/adrs/013-use-aws-secrets-manager-for-secrets.html.md.erb
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- | ||
owner_slack: "#nvvs-devops" | ||
title: 006 - Use AWS Secrets Manager for Secrets | ||
last_reviewed_on: 2024-11-07 | ||
review_in: 6 months | ||
--- | ||
|
||
# 013 - Use AWS Secrets Manager for Secrets | ||
Date: 2020-11-07 | ||
|
||
## Status | ||
✅ Accepted | ||
|
||
## Context | ||
|
||
There is a need to store infrastructure secrets securely in the [PTTP](https://ministry-of-justice-acronyms.service.justice.gov.uk/#:~:text=Prison%20Technology%20Transformation%20Programme) programme. Typical examples of secrets include API keys to reference external services, and AWS account IDs. | ||
|
||
## Decision | ||
|
||
Use AWS Secrets Manager. | ||
- Aligned with [MoJ Security Guidance](https://security-guidance.service.justice.gov.uk/secrets-management/#application--infrastructure-secrets) | ||
- Compatible with AWS services e.g. [CodePipelines](https://docs.aws.amazon.com/codebuild/latest/userguide/build-spec-ref.html#build-spec-ref-example) | ||
- AWS Secrets Manager has the ability to automatically rotate secrets for AWS RDS access. AWS Secrets Manager has a higher cost than AWS SSM Parameter Store. | ||
- AWS Secrets Manager has a higher cost than AWS SSM Parameter Store. | ||
|
||
### Alternative Considerations: | ||
|
||
#### HashiCorp Vault | ||
HashiCorp Vault is an open-source secret management solution. In order to use it we would have to host and manage an instance of the service ourselves. The cost of hosting, as well as the time to ensure data has appropriate backups, gives this service a high maintenance cost and overhead. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters