Fact: Hackers would love to get hold of your username and password or access key and secret access key and run up a big bill running a crypto mining operation on EC2. In this post we'll look at two ways to protect yourself when running commands from AWS CLI or automation tools from your personal computer.
Working with secrets correctly in todays security environment is crucial. Storing database passwords and API keys in plain text files or in the source control system is just plain reckless. There are a few good options out there and today we are going to look at Docker Secrets.
What I really like about Docker Secrets are that it is so simple to use. Complexity is the enemy of security and with Docker Secrets being so simple it is hard to mess it up.