Secrets and Sensitive Salues
In Nuon, secrets and sensitive values are entered by the customer, not the vendor, when they deploy the AWS CloudFormation stack. They are then stored in AWS Secrets Manager and are retrieved programmatically by the Nuon runner in the customer cloud account to insert into components as the vendor’s software is provisioned or updated. Nuon can automatically sync secrets to a Kubernetes cluster deployed by the Nuon runner, which can then be referenced in components like Helm charts, Kubernetes manifests, and Terraform modules. The vendor by default cannot access the secrets unless the customer happened to approve IAM roles with elevated privileges to run action scripts to view the secrets.Log Viewing and Exfiltration Prevention
By default, Nuon only stores logs of the infrastructure changing in the customer account. e.g., creating a Kubernetes cluster, deploying a Helm chart, running Terraform. Application logs are not accessible or sent to the Nuon control plane. One of Nuon’s concepts is an action - which are vendor-defined scripts to deploy infrastructure but are also useful in troubleshooting and debugging. Outputs of actions are stored in the Nuon control plane. Actions are defined by IAM roles and permissions that vendor’s customers would approve before hand. If those roles were elevated enough to execute commands that can access sensitive data like a database table withpsql or view a Kubernetes secret with kubectl, the outputs would be stored in the Nuon control plane.
If vendors implement the customer dashboard, audit logs can be exposed to the customer to view what infrastructure was changed. The vendor can also export those install logs as a CSV file and share directly with the customer.