Store Amazon S3 keys in a private repo
2 answers
As stated in the GitHub Security Page :
We do not encrypt the repos on disk because it will not be more secure: the website and git will need to decrypt the repositories on demand to shutdown, slowing down the response time
So, if there is any leak ( as in 2012 ), your data is also missing.
You can see that the approach is being criticized in this thread .
I would recommend an external service that you monitor for your secrets.
For example, HashiCorp Vault is good.
+3
source to share
@vonc is correct, but if you don't want to configure and maintain the store, you might want to consider using the aws parameter store ( https://aws.amazon.com/ec2/systems-manager/parameter-store/ ) to store your secret keys. which is much easier.
0
source to share