@@ -9,14 +9,10 @@ description: Simple And Flexible Tool For Managing Secrets
99
1010 <div class =" flex flex-column align-items-center " >
1111 <p class =" hero-text-secondary " >
12- <span class="hero-tags">Decrypt a file</span>
13- <span class="hero-tags">Encrypt a file using AWS</span>
14- <span class="hero-tags">Encrypt a file using GCP</span>
15- <span class="hero-tags">Encrypt a file using Azure</span>
16- <span class="hero-tags">Encrypt a file using Age</span>
17- <span class="hero-tags">Encrypt a file using PGP</span>
18- <span class="hero-tags">Edit encrypted file</span>
19- <span class="hero-tags">Edit decrypted file</span>
12+ <span class="hero-tags">Encrypt configuration</span>
13+ <span class="hero-tags">Keep structure visible</span>
14+ <span class="hero-tags">Access management through identities</span>
15+ <span class="hero-tags">Offline and cloud based identities</span>
2016 </p >
2117 </div >
2218
@@ -34,35 +30,45 @@ description: Simple And Flexible Tool For Managing Secrets
3430
3531{{% blocks/section color="white" type="row" %}}
3632
37- {{% blocks/feature title="Key Groups" icon="fab fa-exchange fa-lg" %}}
38- By default, SOPS encrypts the data key for a file with each of the
39- master keys, such that if any of the master keys is available, the
40- file can be decrypted. However, it is sometimes desirable to require
41- access to multiple master keys in order to decrypt files. This can be
42- achieved with key groups.
33+ {{% blocks/feature title="Encrypt configuration sensibly" icon="fa-exchange fa-lg" %}}
34+ SOPS encrypts configuration files while keeping the structure visible.
35+ Keys are not encrypted, while values and comments are encrypted.
36+ This allows you to understand the configuration without seeing sensible values.
4337 {{% /blocks/feature %}}
4438
45- {{% blocks/feature title="Auditing" icon="fab fa-box-open fa-lg" %}}
46- Sometimes, users want to be able to tell what files were accessed by
47- whom in an environment they control. For this reason, SOPS can
48- generate audit logs to record activity on encrypted files. When
49- enabled, SOPS will write a log entry into a pre-configured PostgreSQL
50- database when a file is decrypted.
39+ {{% blocks/feature title="Various config file formats" icon="fa-box-open fa-lg" %}}
40+ SOPS supports [ YAML] ( https://yaml.org/ ) , [ JSON] ( https://www.json.org/ ) ,
41+ and specific flavors of [ INI] ( https://en.wikipedia.org/wiki/INI_file ) and DotEnv configuration files.
42+ You can also encrypt files completely through SOPS' "binary" store.
5143 {{% /blocks/feature %}}
5244
53- {{% blocks/feature title="Key Service" icon="fab fa-plug fa-lg" %}}
54- There are situations where you might want to run SOPS on a machine
55- that doesn't have direct access to encryption keys such as PGP keys.
56- The sops key service allows you to forward a socket so that SOPS can
57- access encryption keys stored on a remote machine.
45+ {{% blocks/feature title="Managing access through identities" icon="fa-users fa-lg" %}}
46+ Access to configuration is managed through identities.
47+ You can configure a set of identities that can access a file,
48+ and also require multiple identities together that a user needs access to to decrypt a file.
5849 {{% /blocks/feature %}}
5950
60- {{% blocks/feature title="Security" icon="fab fa-vector-square fa-lg" %}}
51+ {{% blocks/feature title="Works offline and online" icon="fa-plug fa-lg" %}}
52+ SOPS can use offline methods (Age, PGP/GnuPG)
53+ and online methods (cloud based KMSes, secret management software)
54+ to encrypt and decrypt a configuration's session key.
55+ You can use SOPS in cloud infrastructure and also locally for disaster recovery.
56+ {{% /blocks/feature %}}
57+
58+ {{% blocks/feature title="Security" icon="fa-key fa-lg" %}}
6159 The security of the data stored using SOPS is as strong as the weakest
62- cryptographic mechanism. Values are encrypted using AES256_GCM which
63- is the strongest symmetric encryption algorithm known today. Data keys
64- are encrypted in either KMS, which also uses AES256_GCM, or PGP which
65- uses either RSA or ECDSA keys.
60+ cryptographic mechanism.
61+ Values are encrypted using [ AES256] ( https://en.wikipedia.org/wiki/Advanced_Encryption_Standard )
62+ in [ GCM] ( https://en.wikipedia.org/wiki/Galois/Counter_Mode ) mode.
63+ How secure the key is stored depends on the identities used.
64+ For example, you can use hybrid [ post-quantum cryptographic] ( https://en.wikipedia.org/wiki/Post-quantum_cryptography ) encryption through [ Age] ( https://age-encryption.org/ ) .
65+ {{% /blocks/feature %}}
66+
67+ {{% blocks/feature title="Key stores" icon="fa-vector-square fa-lg" %}}
68+ SOPS supports [ Age] ( https://age-encryption.org/ ) and PGP/[ GnuPG] ( https://www.gnupg.org/ ) for offline identities,
69+ and [ Amazon AWS KMS] ( https://aws.amazon.com/kms/ ) , [ Google Cloud KMS] ( https://docs.cloud.google.com/kms/docs ) ,
70+ [ Azure KMS] ( https://en.wikipedia.org/wiki/Microsoft_Azure ) , [ HuaweiCloud KMS] ( https://cloud.huawei.com/ ) ,
71+ [ HashiCorp Vault] ( https://www.hashicorp.com/en/products/vault ) , and [ OpenBAO] ( https://openbao.org/ ) for online identities.
6672 {{% /blocks/feature %}}
6773
6874{{% /blocks/section %}}
0 commit comments