Security
Security best practices and audit logging
Rules
- ALL passwords MUST come from KMS — Never plaintext
- Rotate keys regularly via KMS key rotation
- Audit all access via KMS audit logs
- Use the K8s operator for automated secret sync
- Enable MFA for administrative access
- IP allowlisting for production environments