Posted in

引入延迟销毁,一种保护您秘密的新方法_AI阅读总结 — 包阅AI

包阅导读总结

1. 关键词:延迟销毁、秘密保护、可观测性、访问控制、Secret Manager

2. 总结:本文介绍了 Secret Manager 中秘密版本的延迟销毁新方式,包括软删除、可配置的存档期、Pub/Sub 通知的可观测性和警报,强调要配合最小权限访问控制,分享了客户反馈,该功能现已普遍可用。

3. 主要内容:

– 延迟销毁方式

– 采取销毁操作时先软删除,将版本状态移至禁用,在存档期内可恢复,期满后永久销毁,存档期可由管理员配置。

– 可观测性和警报

– 通过新增的 Pub/Sub 通知 SECRET_VERSION_DESTROY_SCHEDULED,向管理员和安全人员通知销毁尝试。

– 访问控制

– 仅启用延迟销毁不够,需设置适当访问控制,仅向受限的高信任用户授予管理员权限。

– 列举不同角色及权限,如 Secret Manager Admin、Secret Version Manager 等。

– 客户反馈

– 客户称赞延迟销毁功能帮助抵御网络攻击和简化备份。

– 开始使用

– 延迟销毁功能已在 Google Cloud 普遍可用,可通过多种方式支持,更多信息可查看文档。

思维导图:

文章地址:https://cloud.google.com/blog/products/identity-security/introducing-delayed-destruction-a-new-way-to-protect-your-secrets/

文章来源:cloud.google.com

作者:Aswin Viswanathan,Yuriy Babenko

发布时间:2024/8/21 0:00

语言:英文

总字数:925字

预计阅读时间:4分钟

评分:87分

标签:秘密管理,Google Cloud,安全性,Pub/Sub 通知,访问控制


以下为原文内容

本内容来源于用户推荐转载,旨在分享知识与观点,如有侵权请联系删除 联系邮箱 media@ilingban.com

Now, when a destroy action is taken , a soft-delete will be performed on the particular version by moving the status of the version to disabled. The secrets remain in an archival period for N days. This period can be configured by administrators using the TTL_DURATION field. During this archival period, an administrator can choose to revive the secret version by re-enabling it and moving to an enabled state. After the delay period expires, the secret version is permanently destroyed.

Observability and alerting via Pub/Sub notification

Observability is a key element of a well-defined security posture. To inform organizational admins and SecOps specialists about any attempts to destroy a secret version, we have added a new optional Pub/Sub notification named SECRET_VERSION_DESTROY_SCHEDULED.Once enabled, any scheduled destruction will notify the appropriate Pub/Sub topic, allowing the on-call personnel to analyze the change and if necessary restore the secret version instead of allowing destruction to proceed.

Complement delayed destruction with least privilege access

Enabling the delayed destruction feature alone will not provide you complete defense against destruction of secret material. It is important that you set appropriate access controls on your secrets. Even with the feature enabled, an administrator of the secret can still choose to delete the complete secret if they wish. Therefore it is imperative that admin access to secrets is only granted to a tightly restricted, highly trusted group of users. For regular lifecycle management operations on secrets, users should only be provided with restricted roles, which grant them the least privileges required to complete the task:

  • Secret Manager Admin: Granted to admins who have full control over secret, versions and its lifecycle. Typically this role would be restricted to a security admin group and not broadly distributed.

  • Secret Version Manager / Secret Version Adder: Granted to devops engineers or service accounts performing lifecycle management on secret versions (add, enable, disable, destroy) or rotation workflows. These roles do not allow any modification of secret properties.

Addressing customer requirements

Feedback from customers who have collaborated with us on the development of delayed destruction has helped strengthen resilience against cyber attacks and streamline backups.

“The ‘delay destruction of secret versions’ capability in Secret Manager helps us defend against disruptive attacks like ransomware or accidental deletion of important secrets in a simple and effective manner. As a financial services company, the security and resilience of our IT platforms is at the heart of what we do,” said Dominik Raub, chief information security officer, Crypto Finance AG, a Deutsche Börse Group company.

“We store credentials and key material in Secret Manager to make it available to applications in a secure manner. Since these secrets are critical to the operation of our applications and infrastructure, they need to be protected against malicious or accidental deletion,” he said. “In the past this was a real challenge on all cloud platforms we are working with. We approached our partners at Google about this issue and were very pleased with their collaborative mindset and the speed at which they delivered a solution. Now we can protect our secrets against deletion with just a few clicks instead of implementing complex backup procedures. And all that without compromising the protection afforded by the Secret Manager.”

Get started with Secret Manager today

Delayed destruction of secret versions in Secret Manager is now generally available with Google Cloud console, API, gcloud and client library support. To learn more about delayed destruction capabilities, please visit the Secret Manager documentation.