{"id":45035,"date":"2022-04-04T09:33:28","date_gmt":"2022-04-04T01:33:28","guid":{"rendered":"https:\/\/version-2.com\/?p=45035"},"modified":"2022-05-30T10:42:17","modified_gmt":"2022-05-30T02:42:17","slug":"how-to-properly-manage-secrets-in-development-projects","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/04\/how-to-properly-manage-secrets-in-development-projects\/","title":{"rendered":"How to Properly Manage Secrets in Development Projects"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"45035\" class=\"elementor elementor-45035\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n<p><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">like passwords and ssh keys are scattered throughout the software development process. However, few people can access this data. Controlled access is still a major challenge for development teams, due to difficulties in managing this information and adopting non-recommended standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The standards that can compromise the security of a system include weak passwords, a topic already addressed <\/span><b>here <\/b><span style=\"font-weight: 400;\">in <\/span><b>senhasegura<\/b><span style=\"font-weight: 400;\">\u2018s blog.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, in this article, we will bring more details about the management of <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">in development processes. To facilitate your understanding, we divided our text into the following topics:<\/span><\/p>\n<p><b style=\"font-size: 18px;\"><\/b><\/p>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What Are <\/b><b><i>Secrets<\/i><\/b><b>?<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Challenges to Manage <\/b><b><i>Secrets <\/i><\/b><b>in Development Projects<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Password Management: Non-Recommended Standards<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Five Key Practices for Secret Management<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Conclusion<\/b><b><\/b><\/li>\n<\/ol>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Follow our text to the end!<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h2><b>What Are <\/b><b><i>Secrets<\/i><\/b><b>?<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All authentication credentials used in applications and services in an IT structure are considered <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\">. This includes passwords, ssh keys, API keys, OAuth tokens, and configuration files.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">management can be viewed as enhanced password management, which includes<\/span> <span style=\"font-weight: 400;\">creating, rotating, revoking, and storing credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After all, the scope in this case is broader, but the purpose remains to protect against unauthorized access to data and systems, data losses, and breaches.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">management contributes to cybersecurity in three instances. They are as follows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Infrastructure Security<\/b><span style=\"font-weight: 400;\"> \u2013 It prevents users, devices, applications, and other network elements from being invaded;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cloud Service Security <\/b><span style=\"font-weight: 400;\">\u2013 It allows you to limit and manage access to cloud-based services;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data Security<\/b><span style=\"font-weight: 400;\"> \u2013 It makes it possible to protect critical systems, among other resources against data losses and breaches.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another advantage of <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">management is to help bring organizations into compliance with the requirements of demanding cybersecurity standards, such as FIPS, NIST, and HIPAA.<\/span><\/p>\n<p><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h2><b>Challenges to Manage <\/b><b><i>Secrets <\/i><\/b><b>in Development Projects<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">management involves some difficulties. Next, let\u2019s point out the most common ones. Check it out:<\/span><\/p>\n<p>&nbsp;<b>Lack of Visibility<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With the migration of IT infrastructure to the cloud, the number of resources, systems, applications, and accounts changes frequently. As a consequence, the places where <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">are stored also change.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, for an organization to remain secure, it is essential to know clearly where this information is stored. What\u2019s more: A lack of visibility can also create obstacles to managing these resources, or when going through an audit.<\/span><\/p>\n<p>&nbsp;<b>Lack of Management Policies&nbsp;<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To meet the criteria of security regulations and facilitate the control of the life cycle phases of a <\/span><i><span style=\"font-weight: 400;\">secret<\/span><\/i><span style=\"font-weight: 400;\">, companies must define rules in security policies, which does not always occur.&nbsp;<\/span><\/p>\n<p>&nbsp;<b>Manual Management<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Most organizations do not use automated <\/span><i><span style=\"font-weight: 400;\">secret <\/span><\/i><span style=\"font-weight: 400;\">management capabilities to manage their digital credentials yet. In this way, they delay the management process and make the storage of <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">more vulnerable.<\/span><\/p>\n<p><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h2><b>Password Management: Non-Recommended Standards<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Many organizations still have non-recommended standards in their password management routine. Here are a few:<\/span><\/p>\n<p>&nbsp;<b>Weak Passwords<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Due to the difficulty in memorizing complex passwords, many people adopt simple and easy-to-remember codes. However, this is one of the main vulnerabilities when it comes to password management. After all, easy-to-remember passwords are just as easy to crack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, malicious agents can discover embedded and encoded passwords with the help of verification tools, by performing a brute force attack or simply guessing.<\/span><\/p>\n<p>&nbsp;<b>Password Sharing<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many companies use shared accounts and passwords to manage their systems, making it impossible to identify who performed each action within an online environment in the event of an incident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, their employees can share passwords with co-workers or others, facilitating the action of attackers interested in sensitive organization data.&nbsp;<\/span><\/p>\n<p>&nbsp;<b>Storing <\/b><b><i>Secrets <\/i><\/b><b>in Plain Text<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is common for employees in a company\u2019s department to use text files that contain all passwords for critical situations or forward messages to colleagues with the necessary <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">to access a resource.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nevertheless, these practices pose risks to the cybersecurity of organizations: attackers only need to obtain a file, message, or email to have tools to hack a system.&nbsp;<\/span><\/p>\n<p>&nbsp;<b>Reuse of <\/b><b><i>Secrets&nbsp;<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is also very common to reuse <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">for different services in order to facilitate their memorization and save time. However, if one malicious user discovers one code, the others will also be compromised.<\/span><\/p>\n<p>&nbsp;<b>Unrevoked <\/b><b><i>Secrets&nbsp;<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">NIST has as a criterion the revocation of user credentials when necessary. This should occur in the event an employee is fired or a contract with a third-party supplier is terminated, for example. However, this security procedure is not followed by all organizations.<\/span><\/p>\n<p>&nbsp;<b><i>Secrets <\/i><\/b><b>Without Rotation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Various security standards dictate that passwords be changed within a given time frame, as do application keys and other types of <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\">. Once again, it is not all companies that follow this recommendation.&nbsp;<\/span><\/p>\n<p><b style=\"color: #333333; font-size: 26px;\">Five Key Practices for Secret Management<\/b><b><\/b><\/p>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are several ways to provide a secure method for protecting <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\">. The following are five important steps to achieve this goal:<\/span><\/p>\n<p>&nbsp;<b>Centralized <\/b><b><i>Secrets<\/i><\/b><b> Management<\/b><\/p>\n<p><span style=\"font-weight: 400;\">First, you should centralize your <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">in one place to ensure more security and facilitate their management. This makes it easier to build governance, security, and auditing to know who accesses this information and when it is accessed.&nbsp;<\/span><\/p>\n<p>&nbsp;<b>ACLs (Access Control Lists)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you have your <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">centralized in one place, make sure the right people have access to them. To do this, you can create human, machine, and application ACLs that give you control of that access.&nbsp;<\/span><\/p>\n<p>&nbsp;<b>Temporary Credentials<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The third and fourth actions must occur simultaneously: they consist of having dynamic <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\">. In practice, to ensure dynamic <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\">, individuals and entities must be given temporary credentials to access the systems.&nbsp;<\/span><\/p>\n<p><b>Encryption<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As mentioned, it is important that data in transit or at rest can be encrypted, with encryption keys centralized in <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\"> management.<\/span><\/p>\n<p>&nbsp;<b>Audit<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Now, you might be wondering how to audit your <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">management and know what was accessed by which user.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each dynamic <\/span><i><span style=\"font-weight: 400;\">secret <\/span><\/i><span style=\"font-weight: 400;\">can be used by a single user, who is properly authenticated when retrieving this information, and encryption as a service allows you to know who accessed an encryption and decryption operation. All of this can give you a complete picture of everything that happens in your IT infrastructure. <\/span><\/p>\n<p><b style=\"color: #333333; font-size: 26px;\">Conclusion<\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<p><span style=\"font-weight: 400;\">By reading this article you have learned what <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\"> are, how they should be managed, and what are the biggest challenges in managing this information. You were also able to understand which standards are not recommended in password management, such as:<\/span><\/p>\n<h2><b><\/b><\/h2>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Weak Passwords;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Password Sharing;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Storing <\/span><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">in Plain Text;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reuse of <\/span><i><span style=\"font-weight: 400;\">Secrets<\/span><\/i><span style=\"font-weight: 400;\">;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unrevoked <\/span><i><span style=\"font-weight: 400;\">Secrets<\/span><\/i><span style=\"font-weight: 400;\">; and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Secrets <\/span><\/i><span style=\"font-weight: 400;\">Without Rotation.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In addition, we presented five fundamental practices for good <\/span><i><span style=\"font-weight: 400;\">secrets<\/span><\/i><span style=\"font-weight: 400;\"> management.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Did you like our text? Share it with someone interested in this information.&nbsp;<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secrets like passwords and ssh keys are scattered throu [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-45035","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Properly Manage Secrets in Development Projects - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Properly Manage Secrets in Development Projects - Version 2\" \/>\n<meta property=\"og:description\" content=\"Secrets like passwords and ssh keys are scattered throu [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-04T01:33:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-to-properly-manage-secrets-in-development-projects\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How to Properly Manage Secrets in Development Projects\",\"datePublished\":\"2022-04-04T01:33:28+00:00\",\"dateModified\":\"2022-05-30T02:42:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-to-properly-manage-secrets-in-development-projects\\\/\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-to-properly-manage-secrets-in-development-projects\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/\",\"name\":\"How to Properly Manage Secrets in Development Projects - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\",\"datePublished\":\"2022-04-04T01:33:28+00:00\",\"dateModified\":\"2022-05-30T02:42:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-properly-manage-secrets-in-development-projects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Properly Manage Secrets in Development Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Properly Manage Secrets in Development Projects - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/","og_locale":"zh_HK","og_type":"article","og_title":"How to Properly Manage Secrets in Development Projects - Version 2","og_description":"Secrets like passwords and ssh keys are scattered throu [&hellip;]","og_url":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/","og_site_name":"Version 2","article_published_time":"2022-04-04T01:33:28+00:00","article_modified_time":"2022-05-30T02:42:17+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/how-to-properly-manage-secrets-in-development-projects\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How to Properly Manage Secrets in Development Projects","datePublished":"2022-04-04T01:33:28+00:00","dateModified":"2022-05-30T02:42:17+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/how-to-properly-manage-secrets-in-development-projects\/"},"wordCount":1120,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/how-to-properly-manage-secrets-in-development-projects\/","url":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/","name":"How to Properly Manage Secrets in Development Projects - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg","datePublished":"2022-04-04T01:33:28+00:00","dateModified":"2022-05-30T02:42:17+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/How-to-Properly-Manage-Secrets-in-Development-Projects.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/how-to-properly-manage-secrets-in-development-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How to Properly Manage Secrets in Development Projects"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-bIn","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/45035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=45035"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/45035\/revisions"}],"predecessor-version":[{"id":45039,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/45035\/revisions\/45039"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=45035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=45035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=45035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}