Vault, External Secrets & CSI: The Ultimate Guide to Secret Management in K8s
“Base64 is not encryption.” This phrase should be displayed prominently in every …

TL;DR
In a multi-cloud world, security is not about location, but identity. Relying on cloud-specific tools like AWS Secrets Manager fragments your security strategy and creates blind spots. HashiCorp Vault is the industry standard to organize this chaos. It acts as a central broker of trust: managing not only static secrets but generating dynamic credentials “Just-in-Time” and providing Encryption-as-a-Service to protect sensitive data before it ever lands in a database.
Traditional security was based on IPs and networks (firewalls). In Kubernetes, where pods come and go, this no longer works.
Vault establishes identity as the new security boundary.
The greatest risk in IT is long-lived credentials (“Rotation Fatigue”). A database password valid for 3 years is a security risk.
AWS Secrets Manager can rotate, but Vault goes a step further with Dynamic Secrets.
A service (e.g., Order-Service) asks Vault: “I need access to the Postgres database”.
Vault connects to the database, creates a new user with a password at that moment (e.g., v-token-order-123).
Vault returns these credentials to the service.
After the time expires (TTL, e.g., 1 hour), Vault automatically deletes the user.
The result: There is no “master password” that can be stolen. Credentials exist only as long as they are needed.
Developers should not program cryptography (“Don’t roll your own crypto”). Mistakes in implementing AES are pre-programmed.
Vault offers the Transit Engine.
Applications send data (e.g., credit card numbers) to the Vault API and receive the encrypted ciphertext back. Only Vault holds the key. The application only stores the ciphertext in the database. Even if the database is stolen (“SQL Dump”), the data is useless because the key remains secure in Vault.
Here it is decided whether your security is tied to a provider or if you operate a global security platform.
Scenario A: AWS Secrets Manager & KMS (The Fragmented Solution)
AWS offers solid tools, but they are island solutions.
Scenario B: HashiCorp Vault with Managed Kubernetes by ayedo
In the ayedo app catalog, Vault is the central fortress.
| Aspect | AWS Secrets Manager / KMS | ayedo (Managed Vault) |
|---|---|---|
| Secret Type | Primarily Static (Rotation possible) | Dynamic (Just-in-Time User) |
| Encryption | KMS (Transparent for AWS Services) | Transit Engine (API for Apps) |
| Multi-Cloud | No (AWS Only) | Yes (Runs Everywhere) |
| Cost | Pay-per-Secret + API Calls | Infrastructure (Flat) |
| Integration | AWS SDK / IAM | K8s Sidecar / Universal API |
| Strategic Risk | High Lock-in (KMS Dependency) | Full Sovereignty |
Isn’t Vault extremely complex to operate?
Yes, Vault is considered one of the most complex tools in the Cloud-Native Stack (“Day 2 Operations”, Unsealing, High Availability). That’s precisely why it’s part of the managed stack by ayedo. We take care of auto-unsealing (automatic unlocking after restart), backups, and upgrades, so you can consume Vault simply as an API.
Why isn’t the External Secrets Operator (ESO) enough?
ESO (see separate article) is great for synchronizing existing secrets from A to B. However, Vault is a Secret Engine. ESO cannot dynamically create database users or encrypt data (Transit). In many architectures, we use both: Vault as the source of truth and ESO to distribute Vault secrets into namespaces.
What happens if Vault fails?
Since Vault is at the center of all applications, it is a critical component. In the ayedo stack, Vault is therefore operated in high-availability (HA) mode with a Raft storage backend. Multiple instances run distributed across nodes (and AZs). If the leader fails, a standby node immediately takes over.
Can Vault also issue certificates (PKI)?
Yes. Vault can function as a full Certificate Authority (CA). It can issue short-lived TLS certificates for microservices, VPNs, or SSH access. This makes it a powerful alternative to AWS Private CA (which is very expensive).
Security should not be an afterthought or an island solution. Using AWS Secrets Manager solves a storage problem. Using HashiCorp Vault solves an architectural problem. Vault enables “Zero Trust” right to the core of the application, regardless of which cloud it floats on. With the ayedo managed stack, you get this powerful security infrastructure ready to operate – the “Fort Knox” for your digital assets, without the operational burden of building the vault.
“Base64 is not encryption.” This phrase should be displayed prominently in every …
TL;DR The Container Registry is the heart of your software supply chain. Trusting cloud services …
Secrets as a Cloud Service or as Part of the Kubernetes Platform Secrets are among the most …