Skip to content

Commit 216ca3f

Browse files
authored
Merge pull request #24930 from adamhjk/patch-1
Explain the insecure by default nature of secrets
2 parents 4917900 + f2a9a3e commit 216ca3f

File tree

1 file changed

+10
-0
lines changed
  • content/en/docs/concepts/configuration

1 file changed

+10
-0
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,16 @@ a password, a token, or a key. Such information might otherwise be put in a
2424
Pod specification or in an image. Users can create Secrets and the system
2525
also creates some Secrets.
2626

27+
{{< caution >}}
28+
Kubernetes Secrets are, by default, stored as unencrypted base64-encoded
29+
strings. By default they can be retrieved - as plain text - by anyone with API
30+
access, or anyone with access to Kubernetes' underlying data store, etcd. In
31+
order to safely use Secrets, we recommend you (at a minimum):
32+
33+
1. [Enable Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/) for Secrets.
34+
2. [Enable RBAC rules that restrict reading and writing the Secret](https://kubernetes.io/docs/reference/access-authn-authz/authorization/). Be aware that secrets can be obtained implicitly by anyone with the permission to create a Pod.
35+
{{< /caution >}}
36+
2737
<!-- body -->
2838

2939
## Overview of Secrets

0 commit comments

Comments
 (0)