OpsMotive Academy

Navigation

CI/CD

Secure Secrets and Keys for Delivery Pipelines

Rotate credentials without drama: vault patterns, OIDC federation, and break-glass drills.

Duration
4 weeks
Format
Cohort
Skill focus
Intermediate
Project intensity
Medium

410,000 KRW

Informational tuition reference — no checkout on this static site.

Visual for Secure Secrets and Keys for Delivery Pipelines

Program narrative

Walk through short-lived credentials for CI, workload identity, and human access patterns that auditors like. You will script rotations with guardrails and practice denial scenarios when metadata endpoints misbehave.

Included focus areas

  • • OIDC trust between CI and cloud roles
  • • Secret lease patterns with explicit TTLs
  • • Emergency access workflows with evidence capture
  • • Audit log fields reviewers expect to see
  • • Migration off long-lived deploy keys
  • • Namespace-scoped access for multi-tenant clusters
  • • Posture review packet templates

Outcomes you can show

  1. Implement OIDC-based deploy role on a lab pipeline
  2. Author a rotation drill with pass or fail criteria
  3. Deliver a reviewer packet with redacted samples

Mentor of record

Portrait for Yuna Kim

Yuna Kim

Infrastructure-as-code specialist who prefers readable plans over clever hacks.

Participant notes

OIDC lab replaced our long-lived keys. Rotation drill surfaced one brittle consumer we are fixing now.
Ben · 5/5

Straight answers

Patterns are portable; deep dives use one reference implementation.