Secrets Management Pipeline
Hardcoded credentials and static secrets are the root cause of a staggering number of security breaches — and even organizations that use a secrets manager often implement it incorrectly, with overly broad access policies, no rotation, and no audit trail of who accessed what. In this challenge, you will design a comprehensive secrets management pipeline on AWS that handles the full lifecycle of secrets: creation, storage, distribution, rotation, and revocation, with zero-trust access controls and complete audit visibility. The storage layer uses AWS Secrets Manager for application secrets (API keys, database credentials, third-party tokens) and AWS Systems Manager Parameter Store (SecureString) for configuration values, with a clear policy defining which service handles which type of secret. Encryption uses customer-managed KMS keys with separate keys per environment (dev, staging, production) and per-team key policies that enforce separation of duties. Automatic rotation is configured for every secret type: RDS database credentials use Secrets Manager's native Lambda-based rotation with a multi-user rotation strategy (alternating between two database users to avoid downtime during rotation), API keys use custom rotation Lambda functions that call the provider API to generate new keys, and TLS certificates use ACM with automatic renewal. The access model uses IAM policies with resource-level conditions: a service can only access secrets tagged with its service name and environment, and access requires both the Secrets Manager permission and the KMS decrypt permission for the secret's encryption key. Emergency access procedures define a break-glass mechanism using a separate IAM role with MFA that can access any secret, with automatic CloudTrail alerting when this role is assumed. The pipeline includes a secret scanning component: a Lambda function triggered by CodeCommit/GitHub webhooks that scans commits for patterns matching secret formats (AWS keys, database connection strings, JWT tokens) and blocks the push while alerting the security team. Compliance reporting uses Athena queries over CloudTrail logs to generate weekly reports showing secret access patterns, rotation compliance, and policy violations. This challenge teaches secrets lifecycle management, encryption key hierarchy design, and the operational patterns for maintaining a zero-trust secrets infrastructure.
AWS Services You'll Use
Challenge Details
- Path
- Security & Resilience
- Difficulty
- Advanced
- Duration
- 65 min
- Plan
- Pro
Architecture Patterns You'll Learn
Why This Challenge?
Unlike whiteboard exercises or multiple-choice quizzes, this challenge requires you to design a real architecture with actual AWS services, evaluate trade-offs, and defend your decisions. Our automated validators check your design against production-grade criteria. Complete it and it shows up in your verified portfolio with your architecture diagram and design rationale.
More from Security & Resilience
Zero-Trust Network Architecture
Design a zero-trust network where every request is authenticated and authorized regardless of network location.
Advanced · 70 minCascading Failure Prevention
Design resilience patterns that prevent a single service failure from cascading across your entire system.
Advanced · 75 minCompliance Automation Engine
Design an automated compliance system that continuously validates, remediates, and reports on cloud governance.
Advanced · 70 minReady to design this for real?
Get the full scenario, design your architecture using real AWS services, and validate against production-grade criteria. Your completed challenge shows up in your verified portfolio.
Start Challenge