Skip to content
This repository has been archived by the owner on Nov 22, 2023. It is now read-only.

Server (in-memory) caching of decrypted secrets #290

Open
mcpherrinm opened this issue Nov 17, 2016 · 0 comments
Open

Server (in-memory) caching of decrypted secrets #290

mcpherrinm opened this issue Nov 17, 2016 · 0 comments

Comments

@mcpherrinm
Copy link
Contributor

Keywhiz decrypts secrets each time they're read from the database.

If there's a secret assigned to many clients, the Keywhiz server will have to load that secret from the database each time, and decrypt it.

There's room for potential optimization here, by having some cache of decrypted secrets.

The security implications need to be carefully considered, but our threat model allows (and keywhiz currently has) decrypted secrets in application memory.

This isn't currently a problem at Square's scale: The amount of CPU we have for redundancy purposes is more than sufficient.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant