
Earlier we used to store our secret variables in GitHub, like DB endpoint/password. Which was not secure, and then we started to store it in SSM parameters in Secret Manager. And during build time, we "sed" all the values from SSM parameters to the application code, which made our secret values secure & inaccessible from the outside world. Review collected by and hosted on G2.com.
Nothing much to dislike it, but during code build, we need to give permission to AWS CloudBuild to access Secret Manager and need to write in yaml files all the values which we want to fetch, but it is all process we need to do to make things good. So not a bad thing to dislike it Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through Google using a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.





