5

The .net core server code I'm working on is going to be hosted both in cloud infrastructure and on premises.

There are many options to handle secret management (connection strings etc...):

  • Big cloud providers are offering dedicated secret management solutions (AWS KMS, Azure Key Vault, etc..).
  • Popular orchestrators, offer also their own service (Kubernetes Secrets for example)
  • In development, we have dedicated secret management tools & process (which are nice)

But how can I store securely secrets on premise hosting? I doubt setting it as a simple variable environment is considered as safe?

chrisdot
  • 659
  • 6
  • 19

2 Answers2

1

In the On Prem setup you need to transfer the RISK to the customer who should ensure that the Master Key in this case let's say that you go for Option #3 in which case the access to the Server should be actively controlled , monitored and should be heavily restricted.

So the onus of security is to prevent any un-authorized person from getting a login access to the Server and your configuration stays secured

Soumen Mukherjee
  • 2,953
  • 3
  • 22
  • 34
  • 1
    Yes, but option#3 (VS secret manager) is normaly designed for dev only (as stated by documentation). Furthermore this is not very handy for secret update (compared to options #1 & #2) – chrisdot Dec 08 '20 at 15:44
0

If your on-prem resources have internet access, I would recommend a Key Vault using client certificate authentication and IP restrictions. If you need more security, you can also use VPN.

Matt Small
  • 2,182
  • 1
  • 10
  • 16