There are 37 repositories under secret-management topic.
Find and verify secrets
♾ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure, prevent secret leaks, and manage internal PKI
:busts_in_silhouette: A bash-tool to store your private data inside a git repository.
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys.
Cloud native secrets management for developers - never leave your command line for secrets.
🔐 Share end-to-end encrypted secrets with others via a one-time URL
👤 Identity and Access Management knowledge for cloud platforms
A helm plugin that help manage secrets with Git workflow and store them anywhere
A tool for managing secrets on Google Cloud
DEPRECATED A helm plugin that help manage secrets with Git workflow and store them anywhere
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
Scan your code for security misconfiguration, search for passwords and secrets. :mag:
The 1Password Connect Kubernetes Operator provides the ability to integrate Kubernetes Secrets with 1Password. The operator also handles autorestarting deployments when 1Password items are updated.
Private key usage verification
A pass extension that helps you keep the whole tree of passwords encrypted inside a Tomb.
Secure your apps by making them Secretless
Jenkins plugin to populate environment variables from secrets stored in HashiCorp's Vault.
Runtime secrets management solution for ECS using Task IAM Roles
Cross-platform secret & config manager for development and CI environments
A command-line secret manager for developers, sysadmins, and devops.
Kubernetes mutating webhook for `secrets-init` injection
VMware Secrets Manager is a lightweight secrets manager to protect your sensitive data. It’s perfect for edge deployments where energy and footprint requirements are strict—See more: https://vsecm.com/