Secret
Glossary Page
Secrets are used to securely store confidential data such as passwords, OAuth tokens, and SSH keys in a Kubernetes cluster. By utilizing Secrets, you can exercise more control over how sensitive data is used and minimize the risk of accidental disclosure. By default, Secret values are encoded as base64 strings and stored unencrypted, but it's possible to configure Secrets to be encrypted when at rest. Pods can reference a Secret in various ways, including as an environment variable or a volume mount. It's worth noting that Secrets are intended for confidential data, while ConfigMaps are better suited for non-confidential data.
Latest Webinars
Latest Articles
Flex: Product Carbon Footprint (PCF) in Catena-X
Flex, a global leader in end-to-end manufacturing, partnered with T-Systems and Catena-X to launch the first live, cross-organizational data chain for secure scope-3 CO₂ emissions data sharing. This milestone enables precise Product Carbon Footprint (PCF) calculations using certified Catena-X solutions. With seamless interoperability, quick deployment, and scalability, Flex achieved compliance with Catena-X standards, showcased the solution live at the 2024 IMDS-AIAG conference, and laid the foundation for future applications like the battery passport.
Read more
Andrea Garcia
Dec 19, 2024
WITTE Automotive: Traceability & PCF data exchange in Catena-X
WITTE Automotive, a global leader in mechatronic locking systems, partnered with T-Systems to implement Catena-X technology for secure and standardized data exchange. By leveraging the Catena-X Sandbox and Connect & Integrate solutions, WITTE successfully prepared for regulatory compliance, improved sustainability reporting, and streamlined collaboration with OEMs and Tier-n suppliers. This step-by-step adoption enabled accurate carbon footprint insights, enhanced traceability, and reduced data exchange inefficiencies, positioning WITTE as an innovator in the automotive industry.
Read more
Andrea Garcia
Dec 19, 2024
Data protection as a service: T-Systems achieves AWS digital sovereignty competency
This blog highlights how T-Systems, an AWS Sovereign Cloud Partner, addresses the growing demand for digital sovereignty. It explores the challenges businesses face in managing data security, regulatory compliance, and innovation in a cloud-first world. The post details T-Systems’ advanced solutions like Data Protection as a Service (DPaaS) and dataspaces, which empower organizations to maintain control over their data, ensure compliance with regulations like GDPR, and enable trusted data collaboration across ecosystems. Tailored for industries like healthcare, finance, and the public sector, these offerings provide secure, scalable, and compliant tools for a digital-first era.
Read more
Mohamed Radwan, Andrea Garcia
Dec 13, 2024