Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure Secret Management #1351

Open
suzuki-shunsuke opened this issue Nov 27, 2023 · 0 comments
Open

Secure Secret Management #1351

suzuki-shunsuke opened this issue Nov 27, 2023 · 0 comments
Labels
enhancement New feature or request security

Comments

@suzuki-shunsuke
Copy link
Owner

suzuki-shunsuke commented Nov 27, 2023

Feature Overview

tfaction provides the feature about the secret management.

https://suzuki-shunsuke.github.io/tfaction/docs/config/secret/

But I think there is rooms to improve the secret management in terms of security.

  1. Google Secret Manager Support: Support the secret management with Google Secret Manager #1350
  2. Use a different GitHub Access Token to manage GitHub with Terraform from a GitHub Token for CI
  3. Generate GitHub Access Tokens from GitHub Apps for each working directory
  4. Support setting repositories and permissions when creating GitHub Access tokens from GitHub Apps
  5. Get GitHub App IDs and private keys from AWS Secrets Manager and Google Secret Manager
  6. Don't output secrets as environment variables to GITHUB_ENV. Expose secrets to only steps which execute Terraform

Use a different GitHub Access Token to manage GitHub with Terraform from a GitHub Token for CI

Permissions and repositories to manage GitHub with Terraform is different from those for CI.
To limit permissions and repositories properly, we should use a different GitHub Access Token to manage GitHub with Terraform from a GitHub Token for CI.

Manage secrets with Secret Manager like AWS Secrets Manager rather than GitHub Secrets

https://dev.to/suzukishunsuke/secure-github-actions-by-pullrequesttarget-641#secret-management

Users should not use export-secrets. We should provide more secure ways.

Don't output secrets as environment variables to GITHUB_ENV. Expose secrets to only steps which execute Terraform

Actions export-secrets and export-aws-secrets-manager output secrets to environment variables, so all subsequent steps can access those secrets. This is not secure.

Why is the feature needed?

To improve the security.

Does the feature include Breaking Changes?

Maybe.

Example Code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request security
Projects
Status: In Progress
Development

No branches or pull requests

1 participant