Downloads: 3 | Views: 15 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper | Computer Science and Information Technology | United States of America | Volume 10 Issue 6, June 2021 | Popularity: 4 / 10
Smart and Modern Solutions for Safeguarding Encrypted Database Credentials with Google Cloud Secret Manager
Srinivas Adilapuram
Abstract: Embedding encrypted database credentials directly in a Java Spring Boot application might seem convenient. But it poses serious security risks. Credentials can be unintentionally exposed during development, testing, or deployment, potentially leading to severe vulnerabilities. A better solution is to use Google Cloud's Secret Manager, which centralizes the management of sensitive information, enforces strict access controls, and integrates seamlessly with automated deployment processes. Secret Manager reduces the likelihood of unauthorized access and protects against data breaches. It also aligns with industry security standards, streamlines operations, and fortifies application security to mitigate the risks associated with security incidents. This paper examined the security challenges of managing database credentials in Spring Boot applications and proposed using Google Cloud's Secret Manager as a solution.
Keywords: Spring Boot, Google Cloud Platform (GCP), Secret Manager, database credentials, security, cloud - native
Edition: Volume 10 Issue 6, June 2021
Pages: 1878 - 1882
DOI: https://www.doi.org/10.21275/SR210611092542
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 1295 - 1298Real-Time Data Processing and Analysis in MIS: Challenges and Solutions
Dhruv K Singhal
Downloads: 0
Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023
Pages: 1936 - 1940Zero Trust Network Segmentation
Anvesh Gunuganti
Downloads: 0
Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019
Pages: 2454 - 2456Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools
Satheesh Reddy Gopireddy
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, Kenya, Volume 11 Issue 2, February 2022
Pages: 401 - 405Security Measures for Protecting of Information Technology Assets
Masese Nelson
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Experimental Result Paper, Computer Science and Information Technology, Oman, Volume 12 Issue 4, April 2023
Pages: 1248 - 1251Ethical Hacking: Numerous Approaches to Spyware Detection and Prevention
Vijaya Bhaskar Reddy Muvva