From the course: Cisco DevNet Associate (200-901) Cert Prep 4: Application Deployment and Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

How to protect application secrets and keys

How to protect application secrets and keys

From the course: Cisco DevNet Associate (200-901) Cert Prep 4: Application Deployment and Security

Start my 1-month free trial

How to protect application secrets and keys

- [Instructor] In this section, let's talk about how to protect application secrets and keys. In software development, we often come across times where we need information that serves as the authentication and authorization mechanism. This usually involves using a key or password that is unique to us and should be only known by the sender. This could be a username and password combination or it could be an API key. We can all agree that this information should be protected and make them as secure as possible. But how should we do it? Let's start from one end of the spectrum. When we put clear text passwords in the script or software it basically has no security. It doesn't really matter how complicated the password it is. If it is written as is in clear text then there's no security around it. During the section on deployment, we talked about using environmental variables in memory during execution runtime, which is a more…

Contents