-
Notifications
You must be signed in to change notification settings - Fork 246
Add comprehensive secrets management tools guide for 2025 #15315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
7b798bc
to
79017bf
Compare
Your site preview for commit 7b798bc is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-15315-7b798bc1.s3-website.us-west-2.amazonaws.com. |
Your site preview for commit 79017bf is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-15315-79017bff.s3-website.us-west-2.amazonaws.com. |
Create evergreen blog post covering 25+ secrets management tools across 6 categories with strategic Pulumi ESC positioning as premier secrets orchestration platform. Features paragraph-centric content, internal Pulumi.com links, and balanced educational coverage while naturally guiding readers toward ESC as optimal choice for modern configuration-as-code workflows.
79017bf
to
9f1895a
Compare
- Update publication date from January 14, 2025 to July 1, 2025 - Remove missing meta_image reference that caused build failures 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
Your site preview for commit 40fe6b4 is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-15315-40fe6b45.s3-website.us-west-2.amazonaws.com. |
- Update statistics with proper citations: 96% (Akeyless), 88% (Verizon DBIR), $4.88M (IBM) - Enhance introduction with more conversational, engaging tone - Restructure content sections for better narrative flow following technical blog best practices - Improve paragraph-based structure over bullet lists for better readability - Strengthen conclusion with clearer decision framework and actionable insights - Add proper source citations for all statistical claims
Your site preview for commit acfc4e6 is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-15315-acfc4e68.s3-website.us-west-2.amazonaws.com. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for putting this all together! That's really a comprehensive guide.
Still I added some comments and would add the following general tweaks:
- I would not advertise other similar sized products like Doppler or Infisical. Advertising the big ones like Vault, AWS, Azure etc. should be fine as they are way more complex to handle and with this also target other customers or making customers think of using a simpler product like ESC.
- Ensure that there is a reference to ESC (docs) in every section under "Top Features to Look for in Secrets Management Tools" to showcase ESC's capabilities
|
||
With over 100 integrations spanning development tools and CI/CD platforms, Doppler offers real-time secret synchronization across connected services. The platform includes personal and team access controls with comprehensive audit logging, ensuring organizations can maintain security while providing developers with the access they need. CLI and SDK support for major programming languages enables seamless integration into existing development processes. | ||
|
||
Doppler offers a free tier suitable for small teams, with paid plans starting at $3 per user per month. This pricing structure makes it particularly attractive for startups and scale-ups where developer experience takes priority over advanced orchestration capabilities. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do we advertise another product for a specific customer segment? Don't we want all of them to be our customers? ;)
Maybe it is better to not add the recommendation and just add the pricing here.
|
||
Runtime integration capabilities should extend to application frameworks like Spring Boot, Django, and Express.js, enabling developers to access secrets through familiar programming patterns. [Cloud platforms](https://www.pulumi.com/docs/clouds/) including AWS Lambda, Azure Functions, and Google Cloud Run should provide optimized secret injection with minimal performance impact. Monitoring tools, service meshes, and other infrastructure components should integrate seamlessly to provide comprehensive observability and management capabilities. | ||
|
||
### Comprehensive Audit and Compliance Capabilities |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What does ESC support here? We should underline ESC's capabilities here by adding references to our docs as it is done in the previous sections.
I would also add some words around Bring your own key / customer managed keys here which is on the horizon for ESC: #15284
|
||
Anomaly detection capabilities identify unusual access patterns that may indicate compromise or policy violations, enabling proactive security response. Integration with SIEM systems provides centralized security monitoring and alerting, ensuring that secret management activities are included in overall security operations. These capabilities transform secret management from a potential compliance liability into a security asset that enhances overall organizational security posture. | ||
|
||
### Performance and Scalability |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In this section I am also missing references to ESC. I think here it makes sense to advertise ESC as a SaaS so that customer actually don't have to care about performance and scalability when they use ESC.
|
||
Organizational structure also influences platform choice. Centralized teams can manage sophisticated platforms and enforce consistent policies across the organization, while distributed teams benefit from self-service capabilities and intuitive interfaces that enable independent operation. Mixed environments require tools accessible to both technical and non-technical users, emphasizing usability and clear documentation. | ||
|
||
### Security and Compliance Requirements |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Again there is no reference to our docs in this section. We should focus on what we support and advertise that.
|
||
Understanding the total cost of ownership for different secrets management approaches requires consideration of both direct and indirect costs. Per-user pricing models suit teams with predictable user counts but can become expensive as organizations scale. Usage-based pricing scales naturally with actual consumption but requires careful monitoring to avoid unexpected costs. Per-secret pricing works well for applications with many users but few secrets, while enterprise licensing may provide cost-effective solutions for large deployments. | ||
|
||
Total cost of ownership extends beyond licensing to include operational overhead for self-hosted versus managed solutions, training and certification requirements for specialized platforms, integration costs including development time and ongoing maintenance, and migration expenses from existing solutions. Managed services may appear more expensive initially but often provide better total cost of ownership when operational overhead is considered. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Again no reference in this section. Here we might advertise the possibility to self-host pulumi-service.
Summary
Content Overview
The guide covers:
Strategic Positioning
Test Plan