Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid

November 24, 2025

From hands-on work with customers, our security services team has identified four practices that put organizations most at risk: 

  • Shared access across teams – one secret or account reused across multiple workloads. 
  • Poor Kubernetes namespace definitions – mixing dev, test, and prod without clear boundaries. 
  • Pipelines under a single identity – Jenkins or Ansible jobs running with unrestricted privileges. 
  • One cloud account or platform for everything – concentrating risk into a single identity plane. 

For each, our security services team will share real-world stories of how attackers exploit these practices, and the  field-tested solutions that leading organizations are adopting to fix them. You’ll learn why the true risk isn’t just the secret, but the identity behind it—and how centralizing secrets management reduces blast radius, improves visibility, and scales securely without disrupting developers. 

You will learn: 

  • How poor secrets practices enable lateral movement and breach escalation. 
  • Four real-world pitfalls we see in customer environments—and proven ways to fix them. 
  • Four real-world pitfalls we see in customer environments—and proven ways to fix them. 
Previous Article
TLS certificate management in 2026: The endless game of Whack-A-Cert
TLS certificate management in 2026: The endless game of Whack-A-Cert

As 2025 races to a close, you’ll see several predictions about AI agents, quantum computing, and other fron...

Next Article
The End of Dual-Purpose TLS Certificates: How to Future-Proof Your Machine Identities
The End of Dual-Purpose TLS Certificates: How to Future-Proof Your Machine Identities

Learn why dual-purpose TLS certificates are ending and how to modernize PKI, secure mTLS, and future-proof ...