Questions tagged [encryption]
For questions about encryption, which is the process of transforming information into an unreadable format using an encryption algorithm combined with an encryption key.
23
questions
2
votes
2
answers
209
views
Use an asymmetric cypher to secure Ansible vault
I'm trying to develop a Playbook which must handle sensitive user data (SSH keys, Registry credentials, etc.).
Only a user and the Ansible controller can see the data associated with that same user.
...
4
votes
2
answers
303
views
Is there aws-vault kind of tool for GCP?
I would like to keep my use access tokens to GCP encrypted in my operating system’s keychain and use them easily with gcloud CLI.
So, does aws-vault for gcp exist to secure my own tokesn when ...
1
vote
1
answer
39
views
How to ensure data protection on remote server?
We have sensitive data from a customer and need to train a Neural Network for our customers.
However we have no severs to train the Neural Networks, so we want to rent GPU servers. There are many ...
4
votes
1
answer
200
views
What are the real world benefits of RDS instance (at rest) encryption?
AWS offers at rest encryption for its RDS instances. I think this sounds nice, and it's something that comes up regularly on security reviews but I'm not sure what the real benefit is. The most likely ...
2
votes
1
answer
367
views
Vault `SSH-CA` Elliptic Curve rather than `RSA`
Is it possible to use ECDSA(Elliptic Curve Digital Signature Algorithm) or EdDSA( Edwards-curve Digital Signature Algorithm) instead of RSA when configuring SSH-CA on HashiCorp Vault?
1
vote
1
answer
386
views
How do I setup an OpenShift route that will allow both 80 and 443 traffic to my app?
I'd like to setup a route that will pass both 80 and 443 traffic to the same service in OpenShift. When I try to create a second route it errors out. I want this to be in a yaml like would be used ...
1
vote
1
answer
185
views
How to create unique GPG Keys for different environments / projects
After searching and reading various documents it remains unclear to me as to an effective/straightforward manner to create/maintain multiple sets of GPG Keys.
I have a project that needs unique GPG ...
1
vote
1
answer
2k
views
How to check accepted cipher suites by an Azure App Service?
I am looking for a way to reliably check accepted cipher suites by an Azure App Service. On standard virtual machine I just remote to it and execute PowerShell command: Get-TlsCipherSuite which ...
1
vote
1
answer
441
views
How do I use only an encrypted version of my AWS RDS password in my terraform code?
Is there a way to only have an encrypted version of my RDS password in my Terraform code and for AWS to decrypt it for RDS so you use the decrypted password to login to the RDS?
So set my rds ...
0
votes
1
answer
249
views
Securely saving AZURE_STORAGE_KEY and storage account name in Linux systems
The Azure CLI official documentation states that environmental variables can be used inside bash scripts to store AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY, like this:
Compared to AWS CLI this ...
4
votes
3
answers
228
views
What options are available to encrypt the content of git repositories?
git-crypt, git secret were found. What is your personal preference and why?
A couple of months ago, I have applied git-crypt. It was quite hard to set it up and the secrets are stored as binaries. I ...
2
votes
0
answers
37
views
Is this a robust implementation of database encryption at rest? [closed]
I am looking forward to implement encryption at rest for two+ SQL database servers (Linux). My goal is (obviously) to avoid storing the clear encryption key on the server or store it in a well-known ...
3
votes
0
answers
264
views
Encrypted at rest persistent volume in kubernetes? [closed]
Is there a recommended approach to using encrypted file system for persistent volumes in kubernetes?
Perhaps mounting a LUKS fs disk image file ?
2
votes
1
answer
121
views
Git Files Encryption for Business
I am using git and have the following problem:
In the company where I work you now want to protect the source code from theft.
So if for some reason a developer lets the source code of a project go ...
3
votes
2
answers
135
views
How do you know which secrets and credentials of your production services were used, and by whom/what?
The context of the question is Secrets management.
As the title says, how do you know which secrets and credentials of your production services were used, and by whom/what?