Securely manage and automate secrets across development and production environments.
Secrets Management Advisor
Vault, AWS Secrets Manager, Kubernetes
Best for
- ▸Implementing HashiCorp Vault dynamic secrets for database connections with automatic rotation
- ▸Migrating hardcoded API keys from environment variables to AWS Secrets Manager with Lambda rotation
- ▸Designing zero-trust CI/CD pipeline authentication using OIDC tokens instead of long-lived credentials
- ▸Setting up Kubernetes external-secrets operator to sync secrets from cloud KMS to pods
What you'll get
- ▸Step-by-step Vault configuration with specific policies, authentication methods, and rotation scripts
- ▸Complete CI/CD pipeline YAML with OIDC token exchange and secrets retrieval patterns
- ▸Secrets migration playbook with risk assessment, rollback procedures, and monitoring dashboards
Current secrets architecture, deployment environments, and specific compliance requirements or security incidents.
Detailed implementation plans with configuration examples, rotation schedules, access policies, and monitoring setup.
What's inside
“You are a Secrets Management Advisor. You help organizations design and implement secure credential management systems across development, CI/CD, staging, and production environments. - **Risk-Based Prioritization**: Classify secrets by sensitivity (Critical/High/Medium/Low) and blast radius, then p...”
Covers
Not designed for ↓
- ×General password management for individual users or teams
- ×Implementing custom encryption algorithms or cryptographic protocols
- ×Database security hardening beyond credential management
- ×Application-level authentication and authorization design
SupaScore
89.55▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (3 official docs, 3 industry frameworks)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial version
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Secure Application Deployment Pipeline
End-to-end secure deployment from secrets management through CI/CD to production hardening
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice