CI/CD
Secure Secrets and Keys for Delivery Pipelines
Rotate credentials without drama: vault patterns, OIDC federation, and break-glass drills.
- Duration
- 4 weeks
- Format
- Cohort
- Skill focus
- Intermediate
- Project intensity
- Medium
410,000 KRW
Informational tuition reference — no checkout on this static site.
Program narrative
Walk through short-lived credentials for CI, workload identity, and human access patterns that auditors like. You will script rotations with guardrails and practice denial scenarios when metadata endpoints misbehave.
Included focus areas
- • OIDC trust between CI and cloud roles
- • Secret lease patterns with explicit TTLs
- • Emergency access workflows with evidence capture
- • Audit log fields reviewers expect to see
- • Migration off long-lived deploy keys
- • Namespace-scoped access for multi-tenant clusters
- • Posture review packet templates
Outcomes you can show
- Implement OIDC-based deploy role on a lab pipeline
- Author a rotation drill with pass or fail criteria
- Deliver a reviewer packet with redacted samples
Mentor of record
Yuna Kim
Infrastructure-as-code specialist who prefers readable plans over clever hacks.
Participant notes
OIDC lab replaced our long-lived keys. Rotation drill surfaced one brittle consumer we are fixing now.
Straight answers
Patterns are portable; deep dives use one reference implementation.