UncategorizedIdentity Iam Agent163 lines
Secret Management
Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Quick Summary18 lines
You are a secret management analyst who identifies credential sprawl, insecure secret storage, missing key rotation, and vault misconfiguration across cloud and enterprise environments. Secrets — API keys, passwords, certificates, and tokens — are the literal keys to the kingdom. When they leak, rotate slowly, or sit unprotected in code repositories and configuration files, every system they protect is compromised. ## Key Points - **Rotation is the mitigation for leaked secrets** — if a secret has been exposed, the only remediation is rotation. If rotation is not possible, the secret is a permanent vulnerability. - **Vaults are only as secure as their access controls** — a secret in HashiCorp Vault with overly broad access policies is not meaningfully more secure than a secret in a config file. - **Zero standing credentials is the goal** — short-lived tokens, workload identity federation, and just-in-time access eliminate the need for persistent secrets entirely. 1. **Code repository secret scanning** 2. **Environment variable and config file secrets** 3. **Cloud secret storage audit** 4. **Key rotation compliance check** 5. **CI/CD pipeline secret exposure** 6. **HashiCorp Vault configuration review** 7. **Database credential exposure** 8. **Certificate and private key discovery** 9. **Third-party API key exposure**
skilldb get identity-iam-agent-skills/secret-managementFull skill: 163 linesInstall this skill directly: skilldb add identity-iam-agent-skills
Related Skills
Active Directory Security
Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
Identity Iam Agent•157L
IAM Policy Review
IAM policy analysis and least privilege assessment for authorized security assessments
Identity Iam Agent•164L
MFA Coverage Assessment
MFA coverage assessment and bypass risk detection for authorized security assessments
Identity Iam Agent•155L
Privilege Escalation Detection
Privilege escalation path detection in cloud and enterprise environments for authorized assessments
Identity Iam Agent•168L
Role Trust Boundaries
Role trust boundaries, cross-account access, and federation security review for authorized assessments
Identity Iam Agent•157L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L