-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider using KMS #1
Comments
Awesome, will rewrite the plugin and the example to work with KMS |
Awesome |
hey guys, I have just spent a good amount of time researching "best practice" handling of secret (ie. database passwords, etc) values in the Is there any plan to get this plugin updated to use KMS instead of a password? As an aside, I think that the general serverless documentation could stand to be updated to better reference Lambda environment variables and the meaning of "at-rest" encryption vs. encrypted values in code (ie. double encryption that will be happening). I would be willing to help update the docs in this regard. |
Hello, just wanted to know if this feature was being actively developed. Thanks! |
Hey @mikelax @ashimaathri, I just merged a couple PRs and I'm about to make a release pretty soon. Unfortunately I don't have the bandwidth to integrate KMS into this plugin. You might have a closer look at this plugin if you are interested in KMS support https://github.com/SC5/serverless-kms-secrets |
https://aws.amazon.com/kms/
With this plugin secrets are actually exposed during the deployment so I would not recommend that as a secure solution. I think that the better solution would be storing secrets in KMS and decrypting them inside lambda during cold start. We could do that with our handler function form stdlib.
The text was updated successfully, but these errors were encountered: