ProficientNowTechRFCs
Platform RFCs/Secret ops interim

Appendix A: Glossary and Indexes

RFC-SECOPS-0002                                                 Appendix A
Category: Standards Track                          Glossary and Indexes

A.1 Term Definitions

TermDefinition
AWS Secrets ManagerA managed AWS service that stores, retrieves, and rotates secrets with built-in encryption at rest via AWS KMS. Used as the sole secret store during the interim period.
AWS IAMAmazon's identity and access management service. Provides authentication and authorization for access to AWS services including Secrets Manager.
AWS SDKAWS Software Development Kit. A set of libraries for programmatic access to AWS services from application code.
AWS CloudTrailAWS service that provides API call logging and monitoring for AWS resources, including Secrets Manager access auditing.
On-Premises InfrastructureLocally hosted servers and virtual machines running application workloads without container orchestration. Used during the interim period before Kubernetes adoption.
ExternalSecretA Kubernetes custom resource (external-secrets.io) that synchronizes secrets from external stores into Kubernetes Secrets. Used in Phase 1 and Phase 2 of migration.
External Secrets Operator (ESO)A Kubernetes operator that reconciles ExternalSecret resources, pulling secrets from external stores and materializing them as Kubernetes Secrets.
GitOpsAn operational framework where Git repositories serve as the source of truth for declarative infrastructure and application configuration.
HashiCorp VaultA secrets management platform providing dynamic secrets, encryption, access control, and audit logging. The target secret store defined in RFC-SECOPS-0001.
IRSA (IAM Roles for Service Accounts)An AWS EKS feature that associates Kubernetes service accounts with IAM roles, eliminating the need for long-lived access keys.
Interim ArchitectureThe temporary secret management system defined by this RFC, designed to be superseded by RFC-SECOPS-0001.
InvariantA rule that MUST hold true at all times. Violation of an invariant invalidates the architecture.
PushSecretA Kubernetes custom resource (external-secrets.io) that pushes secrets from Kubernetes to an external secret store. Used in Phase 2 for internal secret distribution.
Secret Config ModuleA centralized application-level module responsible for all interactions with the secret store (AWS SDK calls during the interim period).
SecretStore / ClusterSecretStoreKubernetes custom resources (external-secrets.io) that define connection parameters to an external secret store.
Secrets Inventory ManifestA Git-tracked YAML file (secrets-inventory.yaml) that records metadata about all platform secrets without containing secret values.
SupersededAn RFC status indicating the document has been replaced by a newer RFC and is frozen.

A.2 Diagram Index

DiagramSectionTypeDescription
System Overview3.1flowchartHigh-level architecture showing Secrets Manager, on-premises VMs, and Git
Trust Boundaries3.3flowchartServer-to-AWS and IAM-to-Secrets Manager trust boundaries
Secret Population Flow3.4.1sequenceDiagramOperator populating secrets into Secrets Manager
Secret Consumption Flow3.4.2sequenceDiagramApplication retrieving secrets via SDK
Component Interaction4.3flowchartInteraction between application, SDK, IAM, and Secrets Manager
Migration Phases5.1stateDiagram-v2Phase 0 → Phase 1 → Phase 2 state transitions

A.3 Invariant Index

InvariantTitleSection
1AWS Secrets Manager Is the Sole Secret Store2.4
2Naming Conventions MUST Align with RFC-SECOPS-00012.4
3Secret Values MUST NOT Exist in Git2.4
4SDK Access MUST Be Centralized Per Application2.4
5The Interim Architecture Is Temporary2.4

On this page