Secrets Management
Environment variables, secret vaults (Azure Key Vault, AWS Secrets Manager), .env file handling, secret scanning, and rotation patterns.
- Difficulty
- intermediate
- Read time
- 1 min read
- Version
- v1.0.0
- Confidence
- established
- Last updated
Quick Reference
Never hardcode secrets. Use environment variables for local dev, secret vaults (Key Vault, Secrets Manager) for production. Add .env to .gitignore. Use secret scanning in CI (gitleaks). Rotate secrets regularly. Use managed identities over API keys when possible. Validate secrets exist at startup.
Use When
- Storing API keys and credentials
- Configuring database connections
- Setting up CI/CD secrets
- Deploying to cloud environments
Skip When
- Public configuration values
- Development-only settings
Secrets Management
Environment variables, secret vaults (Azure Key Vault, AWS Secrets Manager), .env file handling, secret scanning, and rotation patterns.