- Newest
- Most votes
- Most comments
Based on your current architecture for managing internal secrets across multiple cloud environments, I can offer several recommendations to enhance security and scalability.
For security improvements:
-
Implement least privilege access using IAM policies to control who can create, read, update, or delete APIs and secrets. Your current approach of using Organization IDs in resource policies is broad - consider implementing more granular controls.
-
Enhance your logging strategy by implementing CloudWatch Logs or Amazon Data Firehose to log all requests to your APIs. This will help with auditing and troubleshooting.
-
Set up CloudWatch alarms to monitor API metrics and receive notifications when thresholds are exceeded, which can help detect unusual activity.
-
Enable AWS CloudTrail to record API actions, capturing details like IP addresses and user information for comprehensive audit trails.
-
Consider using AWS Config to monitor your API Gateway resource configurations and evaluate compliance.
-
Leverage AWS Security Hub to monitor API usage and compliance with security best practices.
For secrets management:
-
Use client-side caching components when retrieving secrets to improve performance and reduce costs associated with frequent API calls to Secrets Manager.
-
Implement regular secret rotation schedules beyond your current auto-rotation setup to minimize risk.
-
Use tools like CodeGuru Reviewer or Amazon Q to scan your codebase for any unprotected secrets.
For scalability across multi-cloud environments:
-
Consider implementing a more sophisticated authentication mechanism that can work across your AWS, Azure, and GCP environments. Your current OIDC approach for non-AWS environments is good, but you might benefit from a more unified strategy.
-
For your API Gateway, instead of broad Organization ID restrictions, consider implementing a token-based authentication system that can work across all your environments while maintaining fine-grained access control.
-
Replicate critical secrets across multiple regions for improved resilience and disaster recovery.
-
Run your infrastructure on private networks where possible to add an additional layer of security.
These recommendations should help make your secrets management architecture more secure and scalable across your multi-cloud environment while maintaining the centralized approach you've established.
Sources
Security best practices in Amazon API Gateway - Amazon API Gateway
API Management - API Tools, Services, and Best Practices
AWS Secrets Manager best practices - AWS Secrets Manager
SEC02-BP03 Store and use secrets securely - AWS Well-Architected Framework
Relevant content
- asked 8 days ago

Hi,
Thank you for response: Can you please provide more details on these points:
Consider implementing a more sophisticated authentication mechanism that can work across your AWS, Azure, and GCP environments. Your current OIDC approach for non-AWS environments is good, but you might benefit from a more unified strategy.
For your API Gateway, instead of broad Organization ID restrictions, consider implementing a token-based authentication system that can work across all your environments while maintaining fine-grained access control.