Smart and Modern Solutions for Safeguarding Encrypted Database Credentials with Google Cloud Secret Manager
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 15 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper | Computer Science and Information Technology | United States of America | Volume 10 Issue 6, June 2021 | Popularity: 4 / 10


     

Smart and Modern Solutions for Safeguarding Encrypted Database Credentials with Google Cloud Secret Manager

Srinivas Adilapuram


Abstract: Embedding encrypted database credentials directly in a Java Spring Boot application might seem convenient. But it poses serious security risks. Credentials can be unintentionally exposed during development, testing, or deployment, potentially leading to severe vulnerabilities. A better solution is to use Google Cloud's Secret Manager, which centralizes the management of sensitive information, enforces strict access controls, and integrates seamlessly with automated deployment processes. Secret Manager reduces the likelihood of unauthorized access and protects against data breaches. It also aligns with industry security standards, streamlines operations, and fortifies application security to mitigate the risks associated with security incidents. This paper examined the security challenges of managing database credentials in Spring Boot applications and proposed using Google Cloud's Secret Manager as a solution.


Keywords: Spring Boot, Google Cloud Platform (GCP), Secret Manager, database credentials, security, cloud - native


Edition: Volume 10 Issue 6, June 2021


Pages: 1878 - 1882


DOI: https://www.doi.org/10.21275/SR210611092542



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Srinivas Adilapuram, "Smart and Modern Solutions for Safeguarding Encrypted Database Credentials with Google Cloud Secret Manager", International Journal of Science and Research (IJSR), Volume 10 Issue 6, June 2021, pp. 1878-1882, https://www.ijsr.net/getabstract.php?paperid=SR210611092542, DOI: https://www.doi.org/10.21275/SR210611092542

Similar Articles

Downloads: 0

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1295 - 1298

Real-Time Data Processing and Analysis in MIS: Challenges and Solutions

Dhruv K Singhal

Share this Article

Downloads: 0

Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1936 - 1940

Zero Trust Network Segmentation

Anvesh Gunuganti

Share this Article

Downloads: 0

Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019

Pages: 2454 - 2456

Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools

Satheesh Reddy Gopireddy

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, Kenya, Volume 11 Issue 2, February 2022

Pages: 401 - 405

Security Measures for Protecting of Information Technology Assets

Masese Nelson

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Experimental Result Paper, Computer Science and Information Technology, Oman, Volume 12 Issue 4, April 2023

Pages: 1248 - 1251

Ethical Hacking: Numerous Approaches to Spyware Detection and Prevention

Vijaya Bhaskar Reddy Muvva

Share this Article
Top