Secure Secrets Management

Secrets Management platforms store, manage and provide secrets. Both cloud-native and legacy applications use secrets management applications to secure variety of secrets including encryption keys, tokens, and passwords.

Development teams need to share data, configurations, and access keys across teams to cooperate on application development and testing. Automated build servers need access to source code control, API gateways, and user roles to accomplish their tasks. Servers need access to encrypted disks, applications need to access databases, and containers must be provisioned with privileges as they start up. Automated services cannot wait around for an administrator to type in passwords or provide credentials. Secrets management platforms address these requirements.

While the data used by secrets management platforms is typically secured while at rest and in motion, secrets information is in the clear and unprotected at runtime. Bad actors can compromise secrets while the data is in use. For example, hackers or malicious insiders can parse data-in-use to obtain the encryption keys for data-at-rest or certificates for data-in-motion.

Anjuna Runtime Security creates a trusted execution environment. It wraps a security boundary around runtime secrets management applications so that secrets remain secret. Whether on-premises or in the public cloud, Anjuna establishes and maintains trust for secrets management applications.