ProficientNowTechRFCs
Platform RFCs/Secret ops interim

7. Future Considerations

RFC-SECOPS-0002                                                   Section 7
Category: Standards Track                           Future Considerations

7.1 Supersession by RFC-SECOPS-0001

This RFC is explicitly designed to be superseded. RFC-SECOPS-0001 defines the target Vault-first, GitOps-native secret management architecture. When that architecture is fully operational, this interim RFC transitions to Superseded status.

7.1.1 Supersession Trigger

The supersession occurs when all Phase 2 completion criteria (Section 5.4.5) are satisfied:

CriterionDescription
All secrets in VaultEvery platform secret resides in HashiCorp Vault
ESO points to VaultAll ExternalSecret resources reference the Vault SecretStore
Secrets Manager decommissionedNo secrets remain in AWS Secrets Manager
RFC-SECOPS-0001 operationalFull Vault-first architecture is active

7.1.2 Status Transition

Upon supersession:

AttributeBeforeAfter
RFC-SECOPS-0002 StatusDraft / AcceptedSuperseded
RFC-SECOPS-0002 Superseded ByRFC-SECOPS-0001 (when implemented)RFC-SECOPS-0001
RFC-SECOPS-0001 StatusDraftAccepted / Implemented

The superseded document is frozen. No further modifications are permitted.


7.2 Interim Architecture Retirement Criteria

The interim architecture MUST be fully retired when supersession occurs. Retirement means:

ActionDescription
Secrets Manager secrets deletedAll secrets removed from AWS Secrets Manager
IAM credentials removedPer-application IAM credentials for Secrets Manager access deleted
Secret Config Modules removedAWS SDK–based modules removed from all application codebases
Inventory manifest archivedsecrets-inventory.yaml retained in Git history but removed from active repository
Documentation updatedAll operational documentation referencing the interim architecture updated to reference RFC-SECOPS-0001

No component of the interim architecture MAY remain operational after the target architecture is fully active.


7.3 Extension Points

While this RFC is explicitly temporary, the following extensions MAY be considered if the interim period extends beyond initial expectations:

7.3.1 AWS Secrets Manager Rotation Automation

If manual rotation becomes operationally untenable before the target infrastructure is available, AWS Secrets Manager's native rotation feature (using AWS Lambda) MAY be introduced.

ConsiderationAssessment
BenefitAutomates rotation for supported secret types
CostRequires AWS Lambda function deployment and maintenance
Migration ImpactLow; rotation moves to Vault regardless
RecommendationAdopt only if rotation burden becomes a demonstrated operational problem

7.3.2 AWS CloudTrail Logging

If audit requirements emerge before the target architecture is available, AWS CloudTrail logging is enabled by default for Secrets Manager API calls. Additional CloudWatch integration MAY be configured for operational alerting.

ConsiderationAssessment
BenefitProvides access audit trail
CostCloudWatch Logs and S3 storage costs (if custom destinations configured)
Migration ImpactNone; Vault audit log replaces CloudTrail-based logging
RecommendationAdopt if compliance or security review demands it

7.3.3 Multi-Region Replication

If disaster recovery requirements emerge, AWS Secrets Manager's cross-region replication MAY be configured.

ConsiderationAssessment
BenefitSecrets available in secondary region
CostPer-secret replication cost; operational complexity
Migration ImpactNone; Vault handles its own replication
RecommendationAdopt only if DR requirements are formalized

7.4 What Does Not Change on Supersession

Certain elements established by this RFC persist into the target architecture by design:

ElementPersistence Reason
Naming conventions (platform-data/, platform-config/ in Secrets Manager and Vault)Segment structure defined by RFC-SECOPS-0001 Section 5a.5; separator is identical across stores
Secret inventory conceptEvolves into Vault-managed secret metadata
Centralized access patternEvolves from Secret Config Module to ESO-mediated Kubernetes Secrets
Separation of metadata from valuesGit tracks intent; runtime system tracks values

These elements are not artifacts of the interim architecture; they are foundational principles of the platform's secret management approach that this RFC adopts early.