Skip to content

Commit 5f992d1

Browse files
committed
Rewrite landing page.
Signed-off-by: Felix Fontein <felix@fontein.de>
1 parent f252190 commit 5f992d1

1 file changed

Lines changed: 36 additions & 30 deletions

File tree

content/en/_index.md

Lines changed: 36 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,10 @@ description: Simple And Flexible Tool For Managing Secrets
99

1010
<div class="flex flex-column align-items-center">
1111
<p class="hero-text-secondary">
12-
<span class="hero-tags">Decrypt a file</span>
13-
<span class="hero-tags">Encrypt a file using AWS</span>
14-
<span class="hero-tags">Encrypt a file using GCP</span>
15-
<span class="hero-tags">Encrypt a file using Azure</span>
16-
<span class="hero-tags">Encrypt a file using Age</span>
17-
<span class="hero-tags">Encrypt a file using PGP</span>
18-
<span class="hero-tags">Edit encrypted file</span>
19-
<span class="hero-tags">Edit decrypted file</span>
12+
<span class="hero-tags">Encrypt configuration</span>
13+
<span class="hero-tags">Keep structure visible</span>
14+
<span class="hero-tags">Access management through identities</span>
15+
<span class="hero-tags">Offline and cloud based identities</span>
2016
</p>
2117
</div>
2218

@@ -34,35 +30,45 @@ description: Simple And Flexible Tool For Managing Secrets
3430

3531
{{% blocks/section color="white" type="row" %}}
3632

37-
{{% blocks/feature title="Key Groups" icon="fab fa-exchange fa-lg" %}}
38-
By default, SOPS encrypts the data key for a file with each of the
39-
master keys, such that if any of the master keys is available, the
40-
file can be decrypted. However, it is sometimes desirable to require
41-
access to multiple master keys in order to decrypt files. This can be
42-
achieved with key groups.
33+
{{% blocks/feature title="Encrypt configuration sensibly" icon="fa-exchange fa-lg" %}}
34+
SOPS encrypts configuration files while keeping the structure visible.
35+
Keys are not encrypted, while values and comments are encrypted.
36+
This allows you to understand the configuration without seeing sensible values.
4337
{{% /blocks/feature %}}
4438

45-
{{% blocks/feature title="Auditing" icon="fab fa-box-open fa-lg" %}}
46-
Sometimes, users want to be able to tell what files were accessed by
47-
whom in an environment they control. For this reason, SOPS can
48-
generate audit logs to record activity on encrypted files. When
49-
enabled, SOPS will write a log entry into a pre-configured PostgreSQL
50-
database when a file is decrypted.
39+
{{% blocks/feature title="Various config file formats" icon="fa-box-open fa-lg" %}}
40+
SOPS supports [YAML](https://yaml.org/), [JSON](https://www.json.org/),
41+
and specific flavors of [INI](https://en.wikipedia.org/wiki/INI_file) and DotEnv configuration files.
42+
You can also encrypt files completely through SOPS' "binary" store.
5143
{{% /blocks/feature %}}
5244

53-
{{% blocks/feature title="Key Service" icon="fab fa-plug fa-lg" %}}
54-
There are situations where you might want to run SOPS on a machine
55-
that doesn't have direct access to encryption keys such as PGP keys.
56-
The sops key service allows you to forward a socket so that SOPS can
57-
access encryption keys stored on a remote machine.
45+
{{% blocks/feature title="Managing access through identities" icon="fa-users fa-lg" %}}
46+
Access to configuration is managed through identities.
47+
You can configure a set of identities that can access a file,
48+
and also require multiple identities together that a user needs access to to decrypt a file.
5849
{{% /blocks/feature %}}
5950

60-
{{% blocks/feature title="Security" icon="fab fa-vector-square fa-lg" %}}
51+
{{% blocks/feature title="Works offline and online" icon="fa-plug fa-lg" %}}
52+
SOPS can use offline methods (Age, PGP/GnuPG)
53+
and online methods (cloud based KMSes, secret management software)
54+
to encrypt and decrypt a configuration's session key.
55+
You can use SOPS in cloud infrastructure and also locally for disaster recovery.
56+
{{% /blocks/feature %}}
57+
58+
{{% blocks/feature title="Security" icon="fa-key fa-lg" %}}
6159
The security of the data stored using SOPS is as strong as the weakest
62-
cryptographic mechanism. Values are encrypted using AES256_GCM which
63-
is the strongest symmetric encryption algorithm known today. Data keys
64-
are encrypted in either KMS, which also uses AES256_GCM, or PGP which
65-
uses either RSA or ECDSA keys.
60+
cryptographic mechanism.
61+
Values are encrypted using [AES256](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard)
62+
in [GCM](https://en.wikipedia.org/wiki/Galois/Counter_Mode) mode.
63+
How secure the key is stored depends on the identities used.
64+
For example, you can use hybrid [post-quantum cryptographic](https://en.wikipedia.org/wiki/Post-quantum_cryptography) encryption through [Age](https://age-encryption.org/).
65+
{{% /blocks/feature %}}
66+
67+
{{% blocks/feature title="Key stores" icon="fa-vector-square fa-lg" %}}
68+
SOPS supports [Age](https://age-encryption.org/) and PGP/[GnuPG](https://www.gnupg.org/) for offline identities,
69+
and [Amazon AWS KMS](https://aws.amazon.com/kms/), [Google Cloud KMS](https://docs.cloud.google.com/kms/docs),
70+
[Azure KMS](https://en.wikipedia.org/wiki/Microsoft_Azure), [HuaweiCloud KMS](https://cloud.huawei.com/),
71+
[HashiCorp Vault](https://www.hashicorp.com/en/products/vault), and [OpenBAO](https://openbao.org/) for online identities.
6672
{{% /blocks/feature %}}
6773

6874
{{% /blocks/section %}}

0 commit comments

Comments
 (0)