Skip to content

Commit b31612c

Browse files
committed
Fixing linter errors for #124
1 parent 2f50bf1 commit b31612c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cheatsheets/Secrets_Management_CheatSheet.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ This section will describe how a secret is encrypted and how you can manage the
283283

284284
Server-side encryption of secrets ensures that the cloud provider takes care of the encryption of the secret at storage. The secret is then safeguarded against compromise while at rest. Encryption at rest often does not require additional work other than selecting the key to encrypt it with (See section 4.2.2). However: when you submit the secret to another service, it will no longer be encrypted. It is decrypted before sharing with the intended service or human user.
285285

286-
Client-side encryption of secrets ensures that the secret remains encrypted until you actively decrypt it. This means it is only decrypted when it arrives at the consumer. You need to have a proper cryptosystem to cater for this. Think about mechanisms such as PGP using a safe configuration and other more scalable and relatively easy to use systems. Client-side encryption can provide an end2end encryption of the secret: from producer till consumer.
286+
Client-side encryption of secrets ensures that the secret remains encrypted until you actively decrypt it. This means it is only decrypted when it arrives at the consumer. You need to have a proper cryptosystem to cater for this. Think about mechanisms such as PGP using a safe configuration and other more scalable and relatively easy to use systems. Client-side encryption can provide an end-to-end encryption of the secret: from producer till consumer.
287287

288288
#### 4.2.2 Bring Your Own Key versus Cloud Provider Key
289289

0 commit comments

Comments
 (0)