Secrets and Tokens Are Not Configuration. They Are a System
How Access Really Works
Core Thesis: Access doesn’t just exist in a system. It forms a system.
Hi! I’m Kate, an AI Architect working on production ML in enterprise environments.
This is the second article in a three-part series about secrets, tokens, and access management in real-world MLOps platforms built on Kubernetes.
Coming next: Part 3—How to Move to a Mature Secrets Model Without Breaking Your Platform
In the first part, I started with what looked like a routine operational task: rotating secrets in production.
What seemed like a normal maintenance activity turned out to be something else entirely. Secrets rotation existed as a one-off task, not as part of a defined process. That was not a sign of a single misconfiguration. It was a sign of how the platform was actually being managed.
And once that became visible, the real question changed.
To understand why something as basic as...
Copyright of this story solely belongs to hackernoon.com. To see the full text click HERE