For questions about encryption, which is the process of transforming information into an unreadable format using an encryption algorithm combined with an encryption key.
Questions tagged [encryption]
23 questions
96
votes
5 answers
How to decrypt Jenkins passwords from credentials.xml?
I've taken over the project where a lot of Jenkins credentials has passwords or passphrase strings which I need to know in order to progress with the project, unfortunately these weren't documented anywhere.
I've checked the credentials.xml file…
kenorb
- 8,011
- 14
- 43
- 80
12
votes
2 answers
How to storing encrypted secrets in code for a serverless.com project?
With serverless.com, the easiest way to expose a secret to an AWS Lambda function is to store it in the serverless.yml file (encrypted with KMS, for example).
But committing encrypted secrets to Git is not the best thing in the world. Requires code…
Assaf Lavie
- 1,251
- 11
- 17
9
votes
2 answers
Is Azure's confidential computing essentially encrypted RAM?
I'm trying to wrap my head around the Azure confidential computing offering.
It appears that that AWS does not offer encryption at the application level (see diagram for what I mean by this:)
My question is: Is Azure's confidential computing…
hawkeye
- 1,153
- 1
- 9
- 14
8
votes
2 answers
Encrypting docker images (end to end); transporting over offline channels
We are developing and building docker images in our intranet, and need to deploy them to several hosts belonging to us (developers, internal testing, external testing and so on). Some of these are in our intranet, some are accessible for 3rd parties…
AnoE
- 4,936
- 14
- 26
7
votes
3 answers
When your micro service in production needs a secret, where is the secret stored and retrieved from?
The context of the question is Secrets management.
How do you manage storing and retrieving secrets for your micro service which is in production?
Zvika Nadav
- 113
- 2
5
votes
4 answers
How can I get a list of encrypted disks for instances that are running on the AWS CLI?
There is a great question here about how to get a list of encrypted disks. I'm currently using the describe-volumes command.
For the record I'm currently using:
aws ec2 describe-volumes --region us-east-1 --filters Name=encrypted,Values=false…
hawkeye
- 1,153
- 1
- 9
- 14
4
votes
3 answers
What options are available to encrypt the content of git repositories?
git-crypt, git secret were found. What is your personal preference and why?
A couple of months ago, I have applied git-crypt. It was quite hard to set it up and the secrets are stored as binaries. I wonder whether git-secret is less cumbersome to…
030
- 13,383
- 17
- 76
- 178
4
votes
2 answers
Is there aws-vault kind of tool for GCP?
I would like to keep my use access tokens to GCP encrypted in my operating system’s keychain and use them easily with gcloud CLI.
So, does aws-vault for gcp exist to secure my own tokesn when accessing gcp?
This is unrelated to AWS Secret Manager
JtR
- 141
- 1
4
votes
1 answer
What are the real world benefits of RDS instance (at rest) encryption?
AWS offers at rest encryption for its RDS instances. I think this sounds nice, and it's something that comes up regularly on security reviews but I'm not sure what the real benefit is. The most likely way someone will get access to my database is…
MrDuk
- 295
- 2
- 8
4
votes
2 answers
What is the simplest way to list which attached disks are encrypted (and which not) on AWS?
An auditor is asking for proof that we've encrypted all the disks on our AWS EC2 VPC. I'd like a way to list all the disks and whether they're encrypted or not.
I know I can build a report with the AWS API (or the CLI) - but I was looking for a…
hawkeye
- 1,153
- 1
- 9
- 14
3
votes
0 answers
Encrypted at rest persistent volume in kubernetes?
Is there a recommended approach to using encrypted file system for persistent volumes in kubernetes?
Perhaps mounting a LUKS fs disk image file ?
barrymac
- 257
- 1
- 5
3
votes
2 answers
How do you know which secrets and credentials of your production services were used, and by whom/what?
The context of the question is Secrets management.
As the title says, how do you know which secrets and credentials of your production services were used, and by whom/what?
Zvika Nadav
- 113
- 2
2
votes
0 answers
Is this a robust implementation of database encryption at rest?
I am looking forward to implement encryption at rest for two+ SQL database servers (Linux). My goal is (obviously) to avoid storing the clear encryption key on the server or store it in a well-known location where the server could grab it as…
Arthur le Perroquet
- 21
- 2
2
votes
1 answer
Git Files Encryption for Business
I am using git and have the following problem:
In the company where I work you now want to protect the source code from theft.
So if for some reason a developer lets the source code of a project go along and sells it, for example.
To prevent this, I…
Emanuel Bennici
- 123
- 3
2
votes
2 answers
Use an asymmetric cypher to secure Ansible vault
I'm trying to develop a Playbook which must handle sensitive user data (SSH keys, Registry credentials, etc.).
Only a user and the Ansible controller can see the data associated with that same user.
The data will be stored in a Git repository,…
Adrien H
- 121
- 3