Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhancement: Integrate AWS Secrets Manager for DNSSEC Key Management #6616

Open
kcolemangt opened this issue Apr 15, 2024 · 0 comments · May be fixed by #6618
Open

Enhancement: Integrate AWS Secrets Manager for DNSSEC Key Management #6616

kcolemangt opened this issue Apr 15, 2024 · 0 comments · May be fixed by #6618

Comments

@kcolemangt
Copy link
Contributor

What would you like to be added:
Integration of AWS Secrets Manager for DNSSEC key management within the CoreDNS DNSSEC plugin. This feature should enable the DNSSEC plugin to retrieve cryptographic keys directly from AWS Secrets Manager, moving away from the dependency on locally stored key files.

Why is this needed:
The current implementation of the DNSSEC plugin in CoreDNS requires cryptographic keys to be stored in local files. This approach can inadvertently lead to insecure practices, such as embedding keys in container images or including them in version control systems, to simplify deployment processes. Such practices expose keys to higher risks of unauthorized access and potential leakage.

Integrating AWS Secrets Manager can mitigate these risks by providing a secure and centralized key management solution, which offers:

  1. Secure Storage and Access: Keys are stored securely in the cloud with encryption at rest and are accessed over encrypted channels, minimizing the risk of exposure during storage and transmission.

  2. Elimination of Insecure Practices: By fetching keys directly from a managed service, there's no need to store keys within the application's operational environment or codebase. This reduces the temptation to use insecure shortcuts in key management during deployment.

  3. Best Practices: Using a managed service like AWS Secrets Manager helps in adhering to security best practices.

This enhancement could improve the security of CoreDNS deployments by providing a more secure method to manage cryptographic keys, aligning with best practices for secure software deployment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant