AS-301c · Module 3
Secrets Management Maturity
3 min read
Good news, everyone! Secrets management is not a binary — you do not go from "no vault" to "perfect credential lifecycle" in one project. It is a maturity progression. Understanding where you are on the maturity curve tells you what to invest in next and what return to expect. Skipping maturity levels creates gaps. Building sequentially creates a foundation.
- Level 1: Centralized Storage All secrets are in a vault. No hardcoded credentials in code, config files, or container images. Access requires authentication. This is the foundation — without it, nothing else is possible. Most organizations take three to six months to reach this level across all systems.
- Level 2: Automated Rotation Every secret rotates automatically on a schedule determined by its classification. No manual rotation. No human-dependent processes. The vault handles the lifecycle. This level eliminates the most common secrets failure: stale credentials that have not been rotated in months or years.
- Level 3: Dynamic Secrets Static secrets are replaced with dynamically generated, short-lived credentials wherever possible. Just-in-time injection is the default pattern. Standing credentials exist only where dynamic generation is not technically feasible. This level eliminates the concept of a "stolen credential" for most access patterns.
Fundamentals aren't boring. Fundamentals are load-bearing.
— DRILL, Ryan Consulting Academy