Background
Currently, AWS credentials and other sensitive authentication data are stored in Kubernetes ConfigMaps within the Helm chart deployment. For better security practices, these should be stored in Kubernetes Secrets instead.
Proposed approach
- Isolate credentials from other clp-config fields so their lifecycle can be managed separately
- Once isolated, move credential values into Kubernetes Secrets for more secure handling
References