{"id":139604,"date":"2023-01-30T12:13:55","date_gmt":"2023-01-30T17:13:55","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/secrets-hub\/"},"modified":"2026-01-22T03:52:50","modified_gmt":"2026-01-22T08:52:50","slug":"secrets-hub","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/","title":{"rendered":"Secrets Hub"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero py-10&#8243;][vc_column width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1><span class=\"ice\">Secrets Hub<\/span><\/h1>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]Gesti\u00f3n centralizada, visibilidad y rotaci\u00f3n de secretos en AWS Secrets Manager (ASM), Azure Key Vault (AKV) y Google Secret Manager (GSM), con detecci\u00f3n para HashiCorp Vault.[\/vc_column_text][vc_btn title=\u00bbSolicitar demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:%23form|title:Obtener%20informe|\u00bb el_class=\u00bbcybv2-button-solid-cyan\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_esp33i5i6x videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1765388773962{background-color: #A0E8F9 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcybv2&#8243;][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbtext-center py-10&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbmb-6&#8243;]<\/p>\n<h3>\u00bfSabe d\u00f3nde est\u00e1n sus b\u00f3vedas de secretos?<\/h3>\n<p>Realice esta breve autoevaluaci\u00f3n para detectar la proliferaci\u00f3n oculta de b\u00f3vedas, comprender los riesgos que corre y saber si cumple las condiciones para un escaneo de secretos.[\/vc_column_text][vc_btn title=\u00bbEvaluar  proliferaci\u00f3n de b\u00f3vedas\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fvault-sprawl-assessment%2F|title:Evaluar%20%20proliferaci%C3%B3n%20de%20b%C3%B3vedas|\u00bb el_class=\u00bbcybv2-button-solid-cyan\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 overview-vt py-10&#8243;][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Proteja las aplicaciones en la nube<\/h3>\n<p>Permita a los desarrolladores seguir utilizando los flujos de trabajo existentes para acceder a los secretos en las b\u00f3vedas de secretos integradas (nativas), al tiempo que proporciona a los equipos de seguridad visibilidad y todas las ventajas de la gesti\u00f3n centralizada de secretos de CyberArk.<\/p>\n<p>Empiece hoy mismo a satisfacer las necesidades de los equipos de seguridad, desarrolladores y operaciones en la nube que crean y despliegan aplicaciones utilizando las b\u00f3vedas integradas de los proveedores de nube.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134795\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"Centralized Secrets Management and Rotation\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Gesti\u00f3n y rotaci\u00f3n centralizadas<\/h4>\n<p>Ofrezca visibilidad, control y rotaci\u00f3n de secretos a los equipos de seguridad, al tiempo que aplica pol\u00edticas unificadas.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134811\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\" alt=\"Same Native Developer Experience\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Experiencia de desarrollo sin cambios<\/h4>\n<p>Permita que los desarrolladores sigan utilizando las b\u00f3vedas de secretos nativas del proveedor de nube, tal y como lo hacen hoy en d\u00eda.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134819\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Escalation.svg\" alt=\"Reduces Vault Sprawl\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Detecci\u00f3n completa<\/h4>\n<p>Detecte y proporcione informaci\u00f3n sobre los secretos gestionados y no gestionados almacenados en b\u00f3vedas.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb disable_element=\u00bbyes\u00bb el_class=\u00bbcybv2 py-10&#8243;][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<\/p>\n<h4>La puntuaci\u00f3n m\u00e1s alta del caso de uso de gesti\u00f3n de secretos del informe Critical Capabilities de Gartner\u00ae para PAM 2023<\/h4>\n<p><span class=\"lead font-weight-normal\">Explore why CyberArk was ranked highest for the Secrets Management use case.<\/span>[\/vc_column_text][vc_btn title=\u00bbObtener informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb css=\u00bb\u00bb el_class=\u00bbcybv2-button-solid-cyan\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcio-pov-what-am-i-actually-supposed-to-do-with-agentic-ai|title:Leer%20ahora|\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_single_image image=\u00bb220379&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 py-10&#8243;][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbtext-center\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>CyberArk es l\u00edder general en el informe Leadership Compass for Enterprise Secrets Management de KuppingerCole Analysts 2025<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=\u00bbObtener informe completo\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb css=\u00bb\u00bb el_class=\u00bbcybv2-button-solid-cyan\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2F2025-kuppingercole-leadership-compass-for-enterprise-secrets-management|title:Obtener%20informe%20completo|\u00bb][\/vc_column][vc_column][vc_single_image image=\u00bb215680&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 pt-12 pb-10&#8243; css=\u00bb.vc_custom_1765388794489{background-color: #082233 !important;}\u00bb][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbpb-8&#8243; offset=\u00bbvc_col-lg-offset-0 vc_col-md-3&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Gestione y detecte de forma centralizada los secretos en b\u00f3vedas nativas de la nube sin alterar la experiencia del desarrollador.<\/h5>\n<p><span class=\"text-white\">Aproveche todas las ventajas de la gesti\u00f3n centralizada de secretos sin afectar los flujos de trabajo de los desarrolladores.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; offset=\u00bbvc_col-md-offset-1 vc_col-md-8&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbpr-4 pb-8&#8243; width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/password__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Gesti\u00f3n y rotaci\u00f3n centralizadas<\/h5>\n<p><span class=\"text-white\">Establezca un control centralizado y aplique una rotaci\u00f3n unificada y otras pol\u00edticas de secretos utilizando los procesos y la infraestructura de seguridad existentes.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbpr-4 pb-8&#8243; width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-security__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Experiencia sin cambios para los desarrolladores y las operaciones<\/h5>\n<p><span class=\"text-white\">Permite a los desarrolladores seguir utilizando AWS Secrets Manager, Azure Key Vault y Google Secret Manager para acceder a los secretos, mientras que los equipos de seguridad obtienen una visibilidad centralizada. Con Secrets Hub, el equipo de seguridad tambi\u00e9n puede detectar el uso de HashiCorp Vault creado y gestionado fuera del control central.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbpr-4 pb-8&#8243; width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-magnifying-glass__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Detecci\u00f3n y visibilidad<\/h5>\n<p><span class=\"text-white\">Obtenga informaci\u00f3n sobre los secretos en las b\u00f3vedas nativas de AWS, Azure y GCP, y detecte las instancias de HashiCorp Vault que pueden estar gestionadas por desarrolladores o equipos fuera de la supervisi\u00f3n central de seguridad.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbpr-4 pb-8&#8243; width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Ampliable y completo<\/h5>\n<p><span class=\"text-white\">Como parte integrada de la Plataforma de Seguridad de la Identidad de CyberArk, permite proteger y gestionar de forma centralizada los secretos de todos los tipos de aplicaciones, as\u00ed como las identidades humanas y de m\u00e1quina.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbpr-4 pb-8&#8243; width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/speed__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h5 class=\"ice\">Simplicidad de SaaS<\/h5>\n<p><span class=\"text-white\">Simplifica las operaciones y la implementaci\u00f3n, minimiza la necesidad de conocimientos especializados y proporciona altos niveles de escalabilidad y disponibilidad.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column el_class=\u00bbtext-md-center pb-12&#8243; offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Elimine la proliferaci\u00f3n de b\u00f3vedas en entornos AWS, Azure y GCP, y obtenga visibilidad del uso de HashiCorp Vault que opera fuera de la gobernanza central.<\/h4>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 pb-10&#8243;][vc_column][vc_single_image image=\u00bb220389&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 customer-stories cybv2-pad\u00bb][vc_column width=\u00bb3\/4&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Ayudamos a clientes de todo el mundo a proteger las identidades de las cargas de trabajo y las aplicaciones en la nube<\/h3>\n<p><\/p>\n<h6>Los clientes de CyberArk utilizan CyberArk Secrets Manager y la Plataforma de Seguridad de la Identidad para proteger todas las identidades humanas y no humanas.<\/h6>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Ver m\u00e1s clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cyb-pad-btm featured-video-overflow\u00bb css=\u00bb.vc_custom_1671212795028{background-color: #ffffff !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbpb-6&#8243;][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg\" alt=\"dz bank logo\" width=\"638\" height=\"622\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg 638w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-300x292.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-150x146.jpg 150w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"double quotes\" width=\"87\" height=\"64\" \/><\/p>\n<p><span class=\"large-quote\" style=\"font-size: 22px;\">\u201c(with) identity security and especially PAM, CyberArk is the key service DZ BANK uses to protect our IT infrastructure. Since integrating CyberArk into our environment, privilege management and security have definitely improved. Fundamentally, it always comes back to having control over privileges and being able to manage secrets.\u201d<\/span><\/p>\n<p><strong>Kurt Sand<\/strong>,\u00a0GM,<br \/>Machine Identity Security at CyberArk[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-business-value-of-cyberark|title:Leer%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-10 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]Monogr\u00e1fico[\/vc_column_text][vc_column_text css=\u00bb\u00bb]Informe sobre el estado de la seguridad de la identidad de m\u00e1quina 2025<i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTI4MTQyIiBwb3MzX2lkPSIxMzU0NzYiIHBvczRfaWQ9IjEyODQ2MSJdPGJyPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 promo-image\u00bb css=\u00bb.vc_custom_1756391477950{background-color: #D6F77A !important;}\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00bb1\/12&#8243; offset=\u00bbvc_col-md-offset-2&#8243;][vc_single_image image=\u00bb220416&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb3\/4&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Mejore la seguridad de las aplicaciones acerc\u00e1ndose a los desarrolladores all\u00ed donde se encuentren<\/h3>\n<p><strong>Consideraciones clave para proteger diferentes tipos de identidades no humanas<\/strong><br \/>Descubra c\u00f3mo simplificar la protecci\u00f3n centralizada de secretos en entornos h\u00edbridos, en la nube y m\u00e1s.[\/vc_column_text][vc_btn title=\u00bbGet the eBook\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fkey-considerations-for-securing-different-machine-identities|title:Get%20the%20eBook|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources\u00bb css=\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explorar<br \/>\nrecursos<br \/>\nrelacionados<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/resources\/\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1765389588065{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPjxicj48YnI+ICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTY5NDc3NzA2OTA3OSI+PC9kaXY+PGJyPjxicj4gIDxzY3JpcHQ+DQogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOw0KICB3aW5kb3cuX3VmSHViQ29uZmlnLnB1c2goew0KICAgICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTY5NDc3NzA2OTA3OSd9LA0KICAgICdjb2xsZWN0aW9uJzogJzEwNjMwOTU5JywNCiAgICAnb3BlbkxpbmsnOmZ1bmN0aW9uKHVybCl7DQogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOw0KICAgIH0sDQogICAgJ2xhenlsb2FkZXInOnsNCiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwNCiAgICAgICdtYXhUaWxlc1BlclJvdyc6MywNCiAgICAgICdtYXhJdGVtc1RvdGFsJzogMw0KICAgIH0sDQogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywNCiAgICAnZW5hYmxlUGFnZVRyYWNraW5nJzpmYWxzZSwNCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsDQogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywNCiAgICAnZ2VuZXJhdGVkQXRVVEMnOiAnMjAyMy0wOS0xNSAwOToyMDo1OCcsDQogIH0pOw0KICA8L3NjcmlwdD48YnI+PGJyPiAgPHNjcmlwdD4oZnVuY3Rpb24oZCx0LHUpIHsNCiAgICBmdW5jdGlvbiBsb2FkKCl7DQogICAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogICAgfQ0KICAgIGlmICh3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcikgew0KICAgICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICAgIH0NCiAgICBlbHNlIGlmICh3aW5kb3cuYXR0YWNoRXZlbnQpIHsNCiAgICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgICB9DQogICAgZWxzZXsNCiAgICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgICB9DQogIH0oZG9jdW1lbnQsJ3NjcmlwdCcsJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvaHVic0Zyb250L2VtYmVkX2NvbGxlY3Rpb24nKSk7DQogIDwvc2NyaXB0Pjxicj4gIDwhLS0gL0VuZCBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1765389636724{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta\u00bb el_id=\u00bbform\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h2>Solicitar demostraci\u00f3n<\/h2>\n<p><strong>Detecci\u00f3n y visibilidad:<\/strong>\u00a0Vea los secretos en AWS, Azure y GCP, y detecte las instancias de HashiCorp Vault fuera de la supervisi\u00f3n de seguridad centralizada.<\/p>\n<p><strong>Gesti\u00f3n y rotaci\u00f3n centralizadas:<\/strong>\u00a0Gestione y rote los secretos de forma coherente en las b\u00f3vedas nativas de AWS, Azure y GCP.<\/p>\n<p><strong>Experiencia de desarrollador sin cambios:<\/strong>\u00a0Conserve los flujos de trabajo de los desarrolladores con AWS, Azure, GCP y HashiCorp Vault, al tiempo que a\u00f1ade visibilidad centralizada.<\/p>\n<p><strong>Reduzca la proliferaci\u00f3n de b\u00f3vedas:<\/strong> Simplifique las operaciones y aumente la visibilidad mediante la gesti\u00f3n centralizada de los secretos en todas las b\u00f3vedas de secretos nativas de los principales proveedores de nube y HashiCorp Vault.[\/vc_column_text][vc_single_image image=\u00bb220389&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbbold\u00bb]<\/p>\n<h5>Empiece con una demostraci\u00f3n de Secrets Hub.<\/h5>\n<p>\n[\/vc_column_text][vc_raw_html css=\u00bb\u00bb]W21hcmtldG9fZm9ybSBpZD0iMTEwOTkiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdGhhbmsteW91LXNlY3JldHMtaHViLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero py-10&#8243;][vc_column width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb] Secrets Hub [\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]Gesti\u00f3n centralizada, visibilidad y rotaci\u00f3n de secretos en AWS Secrets Manager (ASM), Azure Key Vault (AKV)&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-139604","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gesti\u00f3n y rotaci\u00f3n de secretos para AWS Secrets Manager | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets Hub\" \/>\n<meta property=\"og:description\" content=\"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T08:52:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\",\"name\":\"Gesti\u00f3n y rotaci\u00f3n de secretos para AWS Secrets Manager | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"datePublished\":\"2023-01-30T17:13:55+00:00\",\"dateModified\":\"2026-01-22T08:52:50+00:00\",\"description\":\"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/es\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secrets Hub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n y rotaci\u00f3n de secretos para AWS Secrets Manager | CyberArk","description":"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/","og_locale":"es_ES","og_type":"article","og_title":"Secrets Hub","og_description":"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.","og_url":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-22T08:52:50+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/","url":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/","name":"Gesti\u00f3n y rotaci\u00f3n de secretos para AWS Secrets Manager | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","datePublished":"2023-01-30T17:13:55+00:00","dateModified":"2026-01-22T08:52:50+00:00","description":"CyberArk Secrets Hub ofrece todas las ventajas de nuestra gesti\u00f3n y rotaci\u00f3n centralizada de secretos para AWS Secrets Manager sin afectar los flujos de trabajo de los desarrolladores.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/es\/products\/"},{"@type":"ListItem","position":3,"name":"Secrets Hub"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/139604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=139604"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/139604\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=139604"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=139604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}