upvote
It’s like 12 lines of terraform to fully automate this, inside your existing IaC infrastructure. It’s not complex.
reply
Secrets tend to be randomly-generated tokens, chosen by the server, whereas passwords tend to be chosen by humans, easier to guess, and reused across different services and vendors.
reply
How does this apply to ssh public keys?
reply
> Long-lived production SSH keys may be copied around, hardcoded into configuration files, and potentially forgotten about until there is an incident. If you replace long-lived SSH keys with a pattern like EC2 instance connect, SSH keys become temporary credentials that require a recent authentication and authorization check.
reply