You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 22, 2023. It is now read-only.
Keywhiz decrypts secrets each time they're read from the database.
If there's a secret assigned to many clients, the Keywhiz server will have to load that secret from the database each time, and decrypt it.
There's room for potential optimization here, by having some cache of decrypted secrets.
The security implications need to be carefully considered, but our threat model allows (and keywhiz currently has) decrypted secrets in application memory.
This isn't currently a problem at Square's scale: The amount of CPU we have for redundancy purposes is more than sufficient.
The text was updated successfully, but these errors were encountered:
Keywhiz decrypts secrets each time they're read from the database.
If there's a secret assigned to many clients, the Keywhiz server will have to load that secret from the database each time, and decrypt it.
There's room for potential optimization here, by having some cache of decrypted secrets.
The security implications need to be carefully considered, but our threat model allows (and keywhiz currently has) decrypted secrets in application memory.
This isn't currently a problem at Square's scale: The amount of CPU we have for redundancy purposes is more than sufficient.
The text was updated successfully, but these errors were encountered: