Does Digital Ocean have something similar to Credstash or AWS Secrets Manager (both AWS services)?
Trying to decide on the most secure way to store environmental variables with sensitive information (like database access codes, for example).
Locally, I have .env file that is named in my .gitignore to prevent it being version controlled.
If just in a .env file or environment variables, what’s the best way to keep that secure for the app to run appropriately?
Much appreciated :)
Cheers
ADDITIONAL INFO:
I have a fullstack SPA (MongoDB, Node, React, Express) on the digital ocean droplet.
Note: Mirror from Stackoverflow (recommended I post this here).
I'm not worried about it getting into source control (.gitignored and githooks to block that)
I'm not worried about employees accessing it. Only a handful have rights to access the server.
Therefore, mostly worried about the first option -- an external party compromising the server, accessing the credentials, and getting into the DB. Thoughts on how I wanted to protect the resource below
– SethGoodluck Apr 17 '20 at 15:53Someone in the other thread mentioned encrypting the .env file at rest.
I also intend to activate the droplet's firewall to only allow port 80.
I also use a GraphQL api so can restrict the allowable verbs to only Posts
I was considering restricting the allowable DB IP address to the server, so even if keys were compromised, the vector would have to come from my own server, which would slow things down.