×

Method and system for providing a secure secrets proxy

  • US 9,396,338 B2
  • Filed: 10/15/2013
  • Issued: 07/19/2016
  • Est. Priority Date: 10/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing a secure secrets proxy comprising:

  • at least one processor; and

    at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing a secure secrets proxy, the process for providing a secure secrets proxy including;

    providing a secure secrets proxy in a first computing environment, the secure secrets proxy being a virtual asset instantiated in the first computing environment, the first computing environment being a cloud environment, the virtual asset being an instance of dynamically allocatable computing resources that are instantiated in the cloud environment, the secure secrets proxy enabling secure decentralization of secrets data from a second computing environment to the cloud environment to decrease access latency for the secrets data from the cloud environment, the secure secrets proxy including secure secrets proxy authentication data, the secure secrets proxy authentication data for identifying the secure secrets proxy as a trusted virtual asset in the first computing environment, the secure secrets proxy authentication data including hardware identification data identifying underlying hardware on which the secure secrets proxy is running;

    providing a secrets distribution management system, the secrets distribution management system being in the second computing environment, the secrets distribution management system having access to the secrets data representing one or more secrets, the secrets distribution management system controlling the distribution of the one or more secrets in accordance with one or more secrets distribution policies;

    the secure secrets proxy providing the secure secrets proxy authentication data to the secrets distribution management system;

    the secrets distribution management system authenticating the secure secrets proxy by comparing the hardware identification data with data obtained via a cloud provider of the cloud environment;

    the secrets distribution management system identifying the secure secrets proxy as a trusted virtual asset eligible to cache secrets data in a secure secrets cache outside the second computing environment, the secure secrets cache being a data store that is outside the second computing environment;

    the secure secrets proxy generating cache secrets request data representing a request for data representing one or more requested secrets to be cached in the secure secrets cache;

    the secure secrets proxy providing the cache secrets request data to the secrets distribution management system; and

    in response to the cache secrets request data, the secrets distribution management system providing data representing the one or more requested secrets to the secure secrets cache.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×