Warren Parad
1 min readJun 17, 2020

--

I’m not sure why the article doesn’t mention the “best option”, which is to commit encrypted credentials using KMS. They aren’t going to visible in any console, and are only decrypted at runtime. Additionally you don’t need any magic other files or technology patterns to make this work since the code and credentials are all in the same place.

--

--

Warren Parad
Warren Parad

Written by Warren Parad

CTO and Founder Authress, Complete Auth for B2B.

Responses (1)