Secrets Management: Beyond Environment Variables

The Twelve-Factor App says store config in environment variables. That was good advice in 2011. For secrets in 2026, we need more. Environment variables work until they don’t: they appear in process listings, get logged accidentally, persist in shell history, and lack rotation mechanisms. For API keys and database credentials, we need purpose-built solutions. The Problems with ENV Vars for Secrets Accidental exposure: 1 2 3 4 5 # This shows up in ps output DB_PASSWORD=secret123 ./app # This gets logged by accident console.log('Starting with config:', process.env); No rotation: Changing a secret means redeploying every service that uses it. During an incident, that’s too slow. ...

February 16, 2026 · 5 min · 918 words · Rob Washington

Secrets Management: Stop Hardcoding Your API Keys

A practical guide to managing secrets in modern applications — from environment variables to HashiCorp Vault, with patterns that actually work.

February 10, 2026 · 5 min · 977 words · Rob Washington