HashiCorp Vault: The Reference Architecture for Centralized Secrets Management & Encryption
TL;DR In a multi-cloud world, security is not about location, but identity. Relying on …

“Base64 is not encryption.” This phrase should be displayed prominently in every platform engineering team. Default Kubernetes Secrets are merely encoded, not encrypted. Anyone with access to the API or the etcd backend can read passwords, API keys, and certificates in plain text.
By 2026, professional Secret Management is a fundamental requirement to meet Compliance mandates and minimize the risk of data theft through “Lateral Movement” within the cluster. We explore how to securely manage sensitive data without disrupting your developers’ workflow.
If you’re using GitOps (e.g., with ArgoCD), you face a problem: you want to store the entire cluster state in Git, but passwords should never end up there.
There are three proven solutions to this problem:
The External Secrets Operator is currently the most popular solution among medium-sized businesses. It acts as a synchronization layer.
ExternalSecret) in Git. The operator securely retrieves the value from the vault and creates a local K8s Secret.Vault is the most powerful solution on the market. It is platform-independent and offers features that go far beyond simple storage.
This approach uses the Container Storage Interface to mount secrets like a drive.
kubectl get secrets.| Feature | External Secrets Operator | HashiCorp Vault | CSI Driver |
|---|---|---|---|
| Complexity | Low | High | Medium |
| Storage Location | Cloud Vaults / Vault | Vault (standalone) | Cloud Vaults |
| K8s Secret Object | Yes (created) | Optional | No |
| Dynamic Secrets | No | Yes (extremely strong) | No |
Modern secret management offers two crucial advantages for medium-sized businesses:
Implementing tools like the External Secrets Operator or HashiCorp Vault is a one-time effort that elevates your platform’s security to a new level. Anyone still manually encoding passwords in YAML files by 2026 is acting grossly negligent. The tools are mature—use them.
Should we use Bitnami Sealed Secrets? Sealed Secrets are a good starting point as they allow encrypted secrets in Git. However, they do not offer centralized management or integration with modern cloud vaults. By 2026, we recommend transitioning to the External Secrets Operator.
What happens if the vault or cloud vault is unreachable? With ESO, the local K8s Secrets remain, allowing apps to continue running. With the CSI driver or Vault injection, the startup of new pods fails. High availability (HA) of the secret store is therefore essential.
How secure is the connection between K8s and the vault? This is secured via service accounts and IAM roles (IRSA on AWS, Workload Identity on Azure/GCP). Thus, no “master passwords” need to be manually stored in the cluster.
TL;DR In a multi-cloud world, security is not about location, but identity. Relying on …
Secrets as a Cloud Service or as Part of the Kubernetes Platform Secrets are among the most …
Secret Management as a Cloud Function or as a Standalone Security Architecture Secrets are not a …