Secrets
Providing secrets to your Tensorlake Serverless functions
Secrets allow providing sensitive values to your functions in a secure manner without having to put them into your code.
Storing secrets
You can store secrets on Tensorlake Serverless using the CLI:
Using secrets
Stored secrets are available as environment variables within your Tensorlake Serverless functions:
CLI Commands
List Secrets
List secrets that have been previously set. Values are not shown for security reasons.
Set a Secret
Set a secret will create or update a secret.
Unset a Secret
Security
Secrets use envelope encryption with AES-256-GCM, providing strong confidentiality and integrity. Each project has a dedicated Data Encryption Key (DEK) wrapped by a root Key Encryption Key (KEK) managed by AWS KMS, creating strict isolation boundaries.
Secrets remain encrypted at rest and are only decrypted in-memory on dataplane machines running workflows that requires those secrets, with all communication secured through mutual TLS (mTLS).
Was this page helpful?